b, 'pids'}, {0x2d, 'rdma'}]}, 0x2b)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100}, [@call, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r2, 0x10, r3, 0x8, &(0x7f0000000080)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r4, r5}, 0x78)
ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)=r2)
socket$kcm(0x10, 0x2, 0x10)

[  524.045360][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:34 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x123, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc1, &(0x7f000000cf3d)=""/193, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78)

[  524.089515][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:35 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000004ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:35 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:35 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x3000000)

14:19:35 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x24, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:35 executing program 2:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'\x00', 0x4009})
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0x10)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r1, 0x8000000000d}, 0x10)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0)
ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000080))
perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r2, 0x0, r3, 0x0)
perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r3, 0x5)
ioctl$TUNSETLINK(r3, 0x400454cd, 0x7)
close(r0)
r4 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)

[  524.292083][ T2753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:35 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
gettid()
perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r')
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ')
r3 = gettid()
r4 = socket$kcm(0x29, 0x2, 0x0)
gettid()
recvmsg$kcm(r4, &(0x7f0000001c40)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000580)=""/255, 0xff}, {&(0x7f0000000300)=""/42, 0x2a}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/220, 0xdc}, {0x0}], 0x5}, 0x2000)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x66, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638477fbac141412e0004301c699da153f08a0e6e380f60102f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36e", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r3, r0, 0x0, 0x2, &(0x7f0000000000)='^\x00'}, 0x30)

[  524.368797][ T2763] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  524.393358][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:35 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:35 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000005ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  524.498079][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:35 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x25, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:35 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4000000)

[  524.668806][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  524.682979][ T2779] device lo entered promiscuous mode
[  524.864442][ T2787] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  524.888833][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:35 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000006ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:35 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x26, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  524.911544][ T2776] Y�4��`Ҙ: renamed from lo
14:19:35 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x5000000)

14:19:35 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:36 executing program 2:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0x2, 0x200000000000001, 0x0)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x400, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x80, 0x0)
ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0x2)
r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000009500000000000029ae80799be62c93f7b091c97554bb677c101e42008000000000075900001943449fc1dcf86e0008d70000000000b1b5af0274000058547d08d3f4215a73e8f7d9ffcd53ac4807eafef8a0e0a78ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f13c7782400000000000600000000000000000000000300000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={r4, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x7ff, 0x0, <r5=>0x0, 0x0, &(0x7f0000000700)={0xa, 0x5}, 0x0, 0x0, &(0x7f0000000740)={0x5, 0x10, 0x46ca, 0x8}, &(0x7f00000009c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=0x4}}, 0x10)
r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9201000000000000000a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec0600da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05f30165ec0e879bfd4c3c92c37d697551a80e37c13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a39149ef8217baebce4e5108c232858edcabec8e7ab062b1fa81a47463a38fa0f147fda1a8b38ef57b03b85b2582730dfff52d5039d41ef8e253723055c34299079fa387ba400ec9432fa638292892374f87a2805e98f34b179ea01aad9a991d102b6351f8af25183d753e22d94369dec1416b3661632681b0f66b11a3fc18f7967aba0ff9fa901c12ec55d3f5b3c68bd2e507a35a4e43f64bb49d0b6c52fe49308e5ecdb03d5cad40b9999d4eae7176cea5c643815bdf6cfef3562cced066cad487543e6fad13c7e78915e204db795164bc0f1955de204510b49b139503082dafb7a032cde4f95d354d2cfc08f6585f81bbd23be69479e999a2c3683058bcc341271ba1e9540499669c403199a8d7dab9be31db3895249ad9e1f5c14aeab82df3a736673724261e6fae02242ad78e55853ad57f111a5eb2fbcbec00"/666], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48)
r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r7, r6, 0xd, 0x2}, 0x10)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r7, r6, 0x8000000000d}, 0x10)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0)
ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000080))
perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r7, 0x0, r8, 0x0)
perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r8, 0x5)
ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000b40))
r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x73712f1974d3c203, 0x53, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0xfb, &(0x7f00000003c0)=""/251, 0x40f00, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x4}, 0x10, r5}, 0x78)
r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0x10)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r10, r9, 0x8000000000d}, 0x10)
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0)
r12 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0)
write$cgroup_int(r12, &(0x7f0000000340)=0x1ff, 0x12)
ioctl$TUNGETSNDBUF(r11, 0x800454d3, &(0x7f0000000080))
perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x16, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r10, 0x0, r11, 0x0)
perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r11, 0x5)
ioctl$TUNSETLINK(r11, 0x400454cd, 0x324)
r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0)
setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r13, 0xab)
sendmsg(r1, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x1, @remote}, 0x80, 0x0}, 0x20000000)

[  525.196849][ T2804] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  525.216446][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  525.239491][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:36 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:36 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x27, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  525.322634][ T2816] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:36 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
gettid()
perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r')
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ')
r3 = gettid()
r4 = socket$kcm(0x29, 0x2, 0x0)
gettid()
recvmsg$kcm(r4, &(0x7f0000001c40)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000580)=""/255, 0xff}, {&(0x7f0000000300)=""/42, 0x2a}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/220, 0xdc}, {0x0}], 0x5}, 0x2000)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x66, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638477fbac141412e0004301c699da153f08a0e6e380f60102f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36e", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r3, r0, 0x0, 0x2, &(0x7f0000000000)='^\x00'}, 0x30)

14:19:36 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000007ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:36 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x6000000)

14:19:36 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  525.577875][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:36 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000008ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:36 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x28, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  525.619883][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  525.641687][ T2849] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  525.661054][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:36 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x7000000)

14:19:36 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  525.882898][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  525.934653][ T2868] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  525.959675][ T2866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:36 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000009ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  525.988282][ T2872] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  526.134848][ T2879] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  526.153586][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:37 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040), 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x53, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0x10)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r1, 0x8000000000d}, 0x10)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0)
ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000080))
perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r2, 0x0, r3, 0x0)
r4 = openat$cgroup_ro(r2, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5)
write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000040))

14:19:37 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000affffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:37 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  526.274469][ T2889] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  526.303412][ T2892] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:37 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
gettid()
perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r')
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ')
r3 = gettid()
r4 = socket$kcm(0x29, 0x2, 0x0)
gettid()
recvmsg$kcm(r4, &(0x7f0000001c40)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000580)=""/255, 0xff}, {&(0x7f0000000300)=""/42, 0x2a}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/220, 0xdc}, {0x0}], 0x5}, 0x2000)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x66, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638477fbac141412e0004301c699da153f08a0e6e380f60102f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36e", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r3, r0, 0x0, 0x2, &(0x7f0000000000)='^\x00'}, 0x30)

14:19:37 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x29, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:37 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa000000)

14:19:37 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:37 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000bffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  526.511897][ T2906] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  526.544842][ T2908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:37 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  526.575265][ T2910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:37 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x2a, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:37 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000cffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  526.650647][ T2908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:37 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xc000000)

[  526.905554][ T2929] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  526.938437][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  526.966774][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  527.041173][ T2937] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:38 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3be, [@union={0x9, 0x0, 0x0, 0x5, 0x0, 0x3f, [{0x10, 0x1, 0x2}]}]}}, &(0x7f0000000040)=""/258, 0x2a, 0x102, 0x8}, 0xfffffffffffffef3)

14:19:38 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:38 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x2b, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:38 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
gettid()
perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r')
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ')
r3 = gettid()
r4 = socket$kcm(0x29, 0x2, 0x0)
gettid()
recvmsg$kcm(r4, &(0x7f0000001c40)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000580)=""/255, 0xff}, {&(0x7f0000000300)=""/42, 0x2a}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/220, 0xdc}, {0x0}], 0x5}, 0x2000)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x66, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638477fbac141412e0004301c699da153f08a0e6e380f60102f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36e", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r3, r0, 0x0, 0x2, &(0x7f0000000000)='^\x00'}, 0x30)

14:19:38 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000dffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:38 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xe000000)

14:19:38 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:38 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40, 0x0)
ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$kcm(0xa, 0x0, 0x3a)
close(0xffffffffffffffff)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000))

14:19:38 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x2c, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  527.510099][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:38 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  527.551149][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  527.621961][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  527.677326][ T2974] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:38 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000effffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:38 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x2d, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:38 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xf000000)

14:19:38 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:38 executing program 2:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150002008178a8001600140006c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xc7}], 0x1}, 0x0)

[  527.971687][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  528.007154][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  528.027123][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  528.141672][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:39 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r2)
close(r1)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='{\x00')

14:19:39 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x2e, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:39 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x802, 0x88)
sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000)
r1 = getpid()
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0)
ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, <r3=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r1, r2, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r3}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={<r4=>0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000200)='em1+^^\x00', r3}, 0x30)
r5 = perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x52, 0xff, 0xc0, 0x0, 0x6, 0x8000, 0x406685fdb688d51c, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x100, 0x7, 0x200, 0x6, 0xfffffffffffffffd, 0x5, 0x5ece}, 0x0, 0x4, 0xffffffffffffffff, 0x2)
perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xef, 0x7f, 0x80, 0x5, 0x0, 0x7, 0x8, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x4, 0xffffffffffffff8e}, 0x980, 0x0, 0x8, 0x0, 0x4, 0x100, 0xfffe}, r4, 0xe, r5, 0x3)
sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90000, 0x5f0c}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0)

14:19:39 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:39 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000fffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:39 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x10000000)

[  528.353860][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  528.376178][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  528.421146][ T3029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:39 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  528.482339][ T3033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:39 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x2f, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:39 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000010ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:39 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x20000000)

[  528.732617][ T3046] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:39 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:39 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x9c8ccc963ecd429f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x3061, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x11, 0xa, 0x300)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={<r1=>0xffffffffffffffff})
socket$kcm(0x2c, 0x3, 0x0)
socket$kcm(0x2, 0x1000000000000002, 0x0)
socket$kcm(0x29, 0x5, 0x0)
ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000040)=0x1)
r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
openat$cgroup_ro(r2, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0)
socket$kcm(0x10, 0x2, 0x10)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
recvmsg$kcm(r3, &(0x7f0000000700)={&(0x7f0000000300)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/136, 0x88}, {&(0x7f0000000600)=""/211, 0xd3}, {&(0x7f00000000c0)=""/19, 0x13}], 0x3, &(0x7f0000000840)=""/4096, 0x1000}, 0x10000)
socket$kcm(0x29, 0x5, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000400))
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0)
r5 = socket$kcm(0x2, 0x2, 0x0)
setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161)
sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00)
write$cgroup_subtree(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="006d9c6d6f727920ce8fb916dddc1b68b1c049e73e175509e0e24ea276f026568a534ccafe24753a1c04f190eb21cc4b220a07200686e1363ad21ecb6f066f03937125f62565e1d714699787add764d415b2b8de7ca8c68714ed5f6f2325a96533e80ebb75c7f23c76e631ec260b4b398c0c1c297b5c74279c5bcc62f4becf2f8f1ea10df759f9ba0d35a8dd45c3c12cf80e438e4d07c55853b3b051048d421c5dfa55cb120aea41760cbe774a00"/196], 0xfdef)

[  528.785151][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  528.823221][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  528.912871][ T3055] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:40 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r2)
close(r1)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='{\x00')

14:19:40 executing program 2:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0x10)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0)
ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000080))
perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r1, 0x0, r2, 0x0)
perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r2, 0x5)
r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x4, 0x9, 0x420, 0xffffffffffffffff, 0x7fffffff, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x3c)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x9, &(0x7f00000001c0)=@raw=[@alu={0x7, 0x1, 0x7, 0x2, 0xf305a49a0f029a1d, 0x30, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3f}, @exit, @exit, @jmp={0x5, 0x0, 0xa, 0xef20639d8c13297c, 0x5, 0xffffffffffffffc0}, @map={0x18, 0x5, 0x1, 0x0, r3}, @generic={0x1, 0x7, 0x3, 0x5, 0x8}], &(0x7f00000000c0)='GPL\x00', 0x3, 0xffa, &(0x7f000062b000)=""/4090, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={0x0, r4, 0x1b}, 0x10)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={r4, 0x0, 0xe, 0xfffffffffffffefc, &(0x7f0000000140)="917b38622c82cd626df641c1d95f", 0x0, 0xffff, 0x0, 0xfffffe9d, 0x47, &(0x7f0000000180)="77001000008c1831a410b3f93b680c332e84fbe6011a176ac612a8da5098214620e9ea8eb6a0a74a20", &(0x7f00000001c0)}, 0x28)

14:19:40 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000011ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:40 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x30, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:40 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x3f000000)

14:19:40 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  529.300662][ T3072] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  529.335165][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  529.358898][ T3075] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:40 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000012ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:40 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:40 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x32, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:40 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x73)
r2 = getpid()
perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0)
r3 = getpid()
perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0)
r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
close(r4)
r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7)
r8 = perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x69, 0x0, 0x5, 0x8, 0x0, 0xff, 0x50080, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x10001, 0x6}, 0x200, 0x0, 0x7, 0x0, 0xc9b, 0x101, 0x1}, r3, 0xc, 0xffffffffffffffff, 0x1)
perf_event_open(&(0x7f0000000140)={0x780bb452d3175b32, 0x70, 0x40, 0xa1, 0x1f, 0x3f, 0x0, 0x7fff, 0x24, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xb4, 0x1, @perf_bp={&(0x7f0000000080), 0x4}, 0x10000, 0x7, 0x363, 0x6, 0xff, 0x5, 0x6}, r2, 0xe, r8, 0x0)
sendmsg(r1, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0, 0x102, &(0x7f0000000000), 0x18}, 0x14f9a99854be918d)
r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r9, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0)

[  529.451021][ T3086] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  529.518114][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:40 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x40000000)

[  529.606132][ T3096] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:40 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  529.736862][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  529.825185][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:41 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r2)
close(r1)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='{\x00')

14:19:41 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000013ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:41 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x38, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:41 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x48000000)

14:19:41 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:41 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
close(0xffffffffffffffff)
socket$kcm(0x10, 0x2, 0x10)
ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\xff\x01\xa0\xff\xff\xff\xff\x00', @random="0100040c0b10"})

[  530.166521][ T3128] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  530.198794][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:41 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000014ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:41 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:41 executing program 2:
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000002a80)=ANY=[@ANYRESDEC=r1], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x401}, 0x10}, 0x78)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05f30165ec0e879bfd4c3c92c37d697551a80e37c13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a39149ef8217baebce4e5108c232858edcabec8e7ab062b1fa81a47463a38fa0f147fda1a8b38ef57b03b85b2582730dfff52d5039d41ef8e253723055c34299079fa387ba400ec9432fa638292892374f87a2805e98f34b179ea01aad9a991d102b6351f8af25183d753e22d94369dec1416b3661632681b0f66b11a3fc18f7967aba0ff9fa901c12ec55d3f5b3c68bd2e507a35a4e43f64bb49d0b6c52fe49308e5ecdb03d5cad40b9999d4eae7176cea5c643815bdf6cfef3562cced066cad487543e6fad13c7e78915e204db795164bc0f1955de204510b49b139503082dafb7a032cde4f95d354d2cfc08f6585f81bbd23be69479e999a2c3683058bcc341271ba1e9540499669c403199a8d7dab9be31db3895249ad9e1f5c14aeab82df3a736673724261e6fae02242ad78e55853ad57f111a5eb2fbcbec000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48)
r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r4, 0xd, 0x2}, 0x10)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r5, r4, 0x8000000000d}, 0x10)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0)
ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f0000000080))
openat$cgroup_ro(r6, &(0x7f0000000740)='cpu.stat\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r5, 0x0, r6, 0x0)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={r5, 0x1, 0x1, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, r2, 0x8000000000d}, 0x10)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0)
ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000080))
perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r3, 0x0, r7, 0x0)
perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r7, 0x5)
r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05f30165ec0e879bfd4c3c92c37d697551a80e37c13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a39149ef8217baebce4e5108c232858edcabec8e7ab062b1fa81a47463a38fa0f147fda1a8b38ef57b03b85b2582730dfff52d5039d41ef8e253723055c34299079fa387ba400ec9432fa638292892374f87a2805e98f34b179ea01aad9a991d102b6351f8af25183d753e22d94369dec1416b3661632681b0f66b11a3fc18f7967aba0ff9fa901c12ec55d3f5b3c68bd2e507a35a4e43f64bb49d0b6c52fe49308e5ecdb03d5cad40b9999d4eae7176cea5c643815bdf6cfef3562cced066cad487543e6fad13c7e78915e204db795164bc0f1955de204510b49b139503082dafb7a032cde4f95d354d2cfc08f6585f81bbd23be69479e999a2c3683058bcc341271ba1e9540499669c403199a8d7dab9be31db3895249ad9e1f5c14aeab82df3a736673724261e6fae02242ad78e55853ad57f111a5eb2fbcbec000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48)
r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r9, r8, 0xd, 0x2}, 0x10)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r9, r8, 0x8000000000d}, 0x10)
r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0)
ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f0000000080))
perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r9, 0x0, r10, 0x0)
perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r10, 0x5)
ioctl$TUNSETPERSIST(r10, 0x400454cb, 0x0)
mkdirat$cgroup(r7, &(0x7f0000000380)='syz1\x00', 0x1ff)
write$cgroup_int(r0, 0x0, 0xfffffdef)
r11 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd454fd08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00000000000000000000000000008e045d29a2f6ebfb7fefcf7dc845b183fac57dc875c1b22889ce3bdfd8204ac3428252a4766b754b5fa14117a7c46b36537adea46b"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r12)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r12, 0x0, 0xd1, 0xb2, &(0x7f0000000180)="9dd86d34d31203279a838187e3e392eeabf183fb625366f70a5deeea3ba8d0d674cb9d404ad8e043e68d5fd9198aae2b7ab594395e31d718320d3574901e352bde88cb763be823e998717e39632a822a1c73dfd31adb16de2729a8bd7e49334dd1d80982c21d5e5d31da574a24d004825a0636c092ed36ba023220fa36c58eeeb5e23bb5f900985f339218fe31a5142078ca7113f5a8ddc49bb5807b369abe33d3f3c608be21e29de476332c438a4afa2464cadc39578317e9badca4c53da6d74668833224544577c057831ef03bafc375", &(0x7f0000000000)=""/178, 0xfffffff8, 0x0, 0x4e, 0x41, &(0x7f0000000280)="b5e2ebd2a7c1a5f0fe5d05e9d454bed064748c2d871ac2406838895397bba7393733307cc543f5c2801a68ca80086e6a32ba5f4dfd4d2acbc51aed16e2f3a3dc9014edb016f13896cbefb183d1ed", &(0x7f0000000300)="ad2ef7489387c7743b106bce309f6783528e47699cad656c9be5083a5bbbbf905154d35c36cd41a1670a42e0091292a14b4c7ba493b58b46c2167e9118d8cd12fc"}, 0x40)

[  530.298168][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:41 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x39, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:41 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x49010000)

[  530.456086][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:41 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  530.566255][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  530.598038][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  530.681867][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:41 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r2)
close(r1)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='{\x00')

14:19:41 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:41 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000015ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:41 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4c000000)

14:19:41 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:41 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70)
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
recvmsg$kcm(r0, &(0x7f000000e780)={&(0x7f000000d140)=@can={0x1d, <r1=>0x0}, 0x80, &(0x7f000000e640)=[{&(0x7f000000d1c0)=""/163, 0xa3}, {&(0x7f000000d280)=""/165, 0xa5}, {&(0x7f000000d340)=""/179, 0xb3}, {&(0x7f000000d400)=""/233, 0xe9}, {&(0x7f000000d500)=""/107, 0x6b}, {&(0x7f000000d580)=""/60, 0x3c}, {&(0x7f000000d5c0)=""/88, 0x58}, {&(0x7f000000d640)=""/4096, 0x1000}], 0x8, &(0x7f000000e6c0)=""/166, 0xa6}, 0x40008000)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0x10)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, r2, 0x8000000000d}, 0x10)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0)
ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000080))
perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r3, 0x0, r4, 0x0)
perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xf, r4, 0x5)
r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000000e840), 0xc)
bpf$PROG_LOAD(0x5, &(0x7f000000e880)={0xa, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x1, 0x0, 0x1, 0x2, 0x0, 0x40, 0x4}, @generic={0xd5, 0x6, 0x1, 0x199e, 0x40}]}, &(0x7f00000000c0)='GPL\x00', 0xffff, 0xff, &(0x7f0000000100)=""/255, 0x41000, 0xd, [], r1, 0x12, r4, 0x8, &(0x7f000000e7c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f000000e800)={0x0, 0x3, 0xffffe000, 0x3}, 0x10, 0xffffffffffffffff, r5}, 0x78)

[  531.026011][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  531.053264][ T3183] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:42 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  531.082872][ T3185] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  531.158329][ T3191] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:42 executing program 2:
socket$kcm(0x29, 0x4, 0x0)
sendmsg$sock(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="a9e2d5b10bc99adc6b2cc839", 0xc}], 0x1, &(0x7f0000000140)=[@timestamping={{0x14, 0x1, 0x25, 0xc0000000}}, @timestamping={{0x14, 0x1, 0x25, 0xee}}, @timestamping={{0x14, 0x1, 0x25, 0x3e9}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0xffff0000}}, @txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000000}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0xf0}, 0x480)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000001880)={&(0x7f0000000280)=@rc={0x1f, {0x9, 0x8, 0x2, 0x3f, 0x80, 0xfe}, 0x6}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000300)="c23400382e363859217f2671dcbb95fc8116b3e1f9e1105c1f97ea03ed9b4ef3f47bd864ac7e994287b9c690076a78de4f1769ffbb4f0daa4f77355fd98267aacc1fc58037fcc167af2cab93a815256fde43f2031f2301ee21f0346c01b3cf2bcdaeeccb429e", 0x66}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="d07fad8fb76c3f63608d082ccceb9ffc393341ff6de513ef66e8127fbaca072a1e4d9680633b07cb10a6c03b23208364661148379c38043a18b1eeb7101e5cc2", 0x40}, {&(0x7f00000013c0)="115b2e0d25c203d87df74028e00b1fc313fb2f5a988c665efa40760a4587e8a985b8e3f980da2b0125047b379677e2c4c306fc7e", 0x34}], 0x4, &(0x7f0000001440)=[{0x90, 0x113, 0x0, "a0495e0ce7ab40c82018e44f1b2b80c7f6e9ee54adab11d85bd8a1e82eaffa73d899d3a790e5a6ca1bf376e9893f3005032fd10d7db9a69c3b62e86f8129ccc1ac98a1eb59483d4a719587ca144016c61b1cc1863757f388d5c94e764ccdc8505297017d96b826f7e271fbb96bfde017d914ac0d405e87bacf36b5"}, {0x50, 0x116, 0x7d, "be2e97d571efa48e8b2f48a368a93c371650afe26247529c87c8a58da8ece5d073b2a6238bec17f0c4a5212290aeb4d021d20e2776e66a482a"}, {0x98, 0x110, 0xfffffff8, "5434c86e6fb1c1f7bfc0b0877ef25bc599b88da18d7749d00ab7120a816c7d71031d3c0d7a9778e9628722ae1591b4e266e27368370dd50a8db364d3486c1abf15ca9de59dc0cdf57a9972cc88301f7b7481ee76906be788d052a06a79146083e1c50af7de3319f411ba415510c18725696ab0c53d4cc33896f396ca3d0cef2d2ccd63154f"}, {0xb0, 0x11, 0x81, "86b9a4420ec135ee11a9100e412fd500621e3896cb05a85dbc15fcf77b2499e8ccc3d6110ef2421a7ee8fe148bc900ac3853f8b16f72a1b171daf80ec6959f3099255e4f14682a6958627ea248b7447d622426c82393fe190f3d1e977b0e04be050f11b4867490680cd1cd460890c00213880737aa75fb9fc562fb052e6ab733e4ec35add3124effec8d9c277b2b8e07982573b47ddd32e38a72dd"}, {0xc0, 0x116, 0x79, "9daa423179f8c52b9d7eac6d722587f845c383300b41eff42725cbf2c282d0cdf790b2f5693c3f3e887d1ed128f84de7cb931775bf9c482c667dedf05f0e44f636bebc8da73969e92c71ad44761b88063a672dd121dbf8e496b4dfb69932ac124cddb97eb1264d78c607819a2cfc16e29a23826be6e31804af5c91112f9eac384262df18ebf10e2328fcc8d941e0ffc0d425853a76733881d60414a449115dfbf9af2469a34e60b471af"}, {0xa0, 0x114, 0x7585, "4a2a75795f251095d23534000976c770bbe627eac83381d1c6938b9d7dbd6df36333dd796ed2b52fc3fe20299c04dba7d8727764f6777bf73c23a3edd75e8ed55a34ad3b5a0a861ec85ae58fb8cf16b71f73461d366937cd5e6ecc1540a06eac96e6a97f80035e02c199b11d68909624bc95947db4ba41917e7f0fa4502ed5f7cc290a951af80205f9d51484f2309f66"}, {0xa0, 0x92a95a69b63c8807, 0x401, "a04c5d95a9ba1980a83b6b0eaf9aece0f1c2817c519f838eac45841866e99e2c9acf673d97ec81b4cd6983049d97cc6ac4dd0fa73ac52a24b067799873a19f105b79d3ee39159d7976f3569f629229a4a006e4ec53e84474b1faeb5747666700e9e66e16f2fa3ca0c5000ad15a2c84429790af83c0417e0882cdabcf2daf25a25f933491f836dd0b4d00"}], 0x428}, 0x22142266c739d2b7)
socket$kcm(0x29, 0x5, 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001900)={0x3, 0xfffff04e}, 0xc)
r1 = socket$kcm(0x2b, 0x1, 0x0)
r2 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000018c0)={r1})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
socketpair(0x9, 0x0, 0x5, &(0x7f0000001e40)={<r3=>0xffffffffffffffff})
sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000001e80)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x3, {0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x80000000}}}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001f00)="a2407712a82ce728a20a89", 0xb}, {&(0x7f0000001f40)="623cd9bd789959b2fb4f4f8db54d0f6152ac6b68f3e4ad7594ed6207ecae77ba9ee96b255d0119c5be86c920c312c2b04da5536b429738a616b63df9deabb133647f8075811d2267a34e3520e6fb322d3c1216b2b2a1e6805c298d70d25ac18dd8b24ee7d8d7afaa51fad3f58532eab5cfca5a88807b60438f45d9213caabd8dc2bfa2271ea6585c2b6aa0884a313e9e86", 0x91}, {&(0x7f0000002000)="e1cd60fbee87bf0f8b7300d428c366b5fca53fbebe25c4695e902713e291537afa506147d7438f9f733886bc21c589f36eb7e4f11ff98ea73e1759c883b1646b7847c090d3173418282998b64bdf1c4501541b49e7cf544266b71f6977eb1e1330c9792a116dd5f4bad00b7a5f792f1d33c94dcd02d4411ed8411e39298d9dc6877458af4ac3bd0a7bf0d5cdde609717614b61ce01c71349e9236977214537e621ef367357fc0bc1d61c69ce115bca74fa3e98877b6e6f1a90fbac7321f8dc4a1637b10d33ab2af2af717f23dd3fe87428ae4b190a7e20d918414ab8708f", 0xde}], 0x3, &(0x7f0000002800)=ANY=[@ANYBLOB="38000000000000000f010000ff010000cfcfb349840c7e74161f8b43d7c796773a939a69cbe3964790bd6bd4483c515af85b9e5cba962c00e8000000000000001e03000009000000ce42c2473d5681b2c5f3d53b243705894892da46bac80fc66ed603c4148de711e84a9df026ebfdc8268c1f914955923af2fce562efca971b1c3254c726e628e8b3f8d7d7450f0feb79f8ab492827da5deae8b03e7c6a399046b32d16cf2de5a445c4c3cc6eec6ed1db99062dfdeddeccebb685c15b66c66410b64b080fc39b3d360bae46cd8cd49ae937fdaa3b016855bca78dd9b39c4286a36b7faf1e78f8409a8c0faffbb555e370eaac5d8339e03fbfd3d1d048a7dc58d624df076c860c878ffce9a2dbb5246bac8eed52837b73891515a5be7b0000001001000000000000120100000600000036f40b2b15f7b015b88b3387e47cb1a3660676796370aa0d40423bf35548dc6fc910c0f7cc070cba10667450519b9e7ab9bf83128da2c5d6fd1309821a154573af46d5559ae9e1e7b51ecb026e649cd7185087d0230f04cccb29217ba75058e1053bc725a9c9a4c63d5bdaf07a8b7044b80fc7db692bbf095f4cc0cfefd9c89b13e4a70a75c870d9f17538d326a4766bfdfd0e477531d965b5916c6c1d6115160765a20164dea1671a7f5a9d1b5d5129535d9f829965e1bd9e1413496a802fbc386137060708d0cf0bd4716d54f13c503a5ed3b59c4dc13dc93c1f346f1a8db4d1158db23267600828baa425a71ab56f2ff0071d2edac2d613a21fe5e90000006000000000000000880000001f000000e309a591a4cda0f8e2682d24f141c74c699967320f6e6115e52a53b84ce4d3bc8b5c45727622f4b113c9308792729e823f322eaa0012f0df11d7aae15c550f5b0a917e9939a0884b76dc4c8f2d844b00f8000000000000008400000096000000c97fae60866255dce744bfa71425567f4a8b035b903bb2a2996e124513fbd20f18bfad72cf5222fbf427de51e3a5beeec43ed73647c879fce7b48c8754489bfe6d602fa28b42b1fdb573f35009044a05f12f75bc834cd421a4018539dd4c3477c8a974cc3796c05d72915a8da72112768372426116bf01873c81d6e196fe22a02488bc9318628831cf780d669ba69a4e0e982dc419df06ad356ab5f3a53b9f4eebbbae5cbf4b9fca20ebc69b0e3780bdda9dcb76d8ba63b9c40a9c0d3b85f11829d94625373715f6ea6befad20e8b7fa9c60293da9e06b63b2f882a984adfd6b0c0000000000000088000000000000000e010000000000009c06f4b796261c6ea191852ec730aa37d77d57a2f24440423cd7e620998e44d0367896ce0552738deea3c155ab25c3b488b8d41c2287564513c2048b033d38e9cc05960d5fb1de96aa85d8d53c10399b8e97b8fa58d7a6268d5413cae760848ba4d7db19bf0d722dfaccadbd584e0e55f98bd0290000000050000000000000000e0100002703000049a4279ea387b3d418f866af373a2c6e714e2b883ef34b33d64e92282cb2edd4dea44598d1feed712585ce61ad477400c04289fe2cafff4844737d210a00000088000000000000001301000001800000d395094a50a7fefc453d88c6ab6dd64a4a28b7aa015ad66c0e3b8e65ea171062566c8511781fc1c3ad9bea61fc6952f84d06127e6867b29a8ccb2b45ce12ca806af617e3f777038fea1bb81f1552be859b2bc06bfe4a30bae584c6e486078fa5704d52a9fda5e51ca2e987523746497aff00000000000000b8000000000000000201000008000000b5f9f5c853f43336045028c8dddd41eebc07eef1b517566e90b1c2e70574058a865bf1d92609255e1330f5abf979bde23ebbd2b35c2189a59c0db6691ee150747fd1f186eeca00d7bdc05a59381bb3405d50f982263bf35bd6168b1013303cf0c7162993fb4f4a79dcb83a411c7aa2b2f900a179b4d68284d5a0977d040a477a2da26c8395189521238fc1715586bd86e22998b0e33131079ba5de4e1f0fbbc0fa080c8300000000c000000000000000ff000000ffffffff5f17217e2f72a5a29ee30ad2bf485dfca9828fc18231fefa3b7d345c0ded39dab6e7f42bd2161f351702a992863a10a7f556ea8c2b79e854efca080b85b5acfdaea02bab3ec7bb6737be99abc6ced49d86e77c75f02ae663b9c0a4f13d1299ec11e16cd840d8817ae55b78ed2fbc9573680b2ba88076e3de8718ae883f3ea7664acac998c8bf47a2b4a2e3666d42c87f1056cbaa7675b2ccaf6850966e3e3b04d7cac4e5b38b7ace3e0fa68c5ff04600abfe685d111d35"], 0x660}, 0x20000000)
sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160400180001ac0f00000004140e000a0002000000dc2976d153b4", 0x235}], 0x1}, 0x0)

14:19:42 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:42 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000016ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:42 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x60000000)

14:19:42 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  531.424569][ T3207] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  531.449898][ T3211] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  531.496710][ T3204] __nla_validate_parse: 6 callbacks suppressed
[  531.496721][ T3204] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'.
[  531.528209][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  531.676550][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  531.703429][ T3213] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'.
14:19:42 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r2)
close(r1)

14:19:42 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000017ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:42 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:42 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:42 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x65580000)

14:19:42 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  531.951061][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  531.967662][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:42 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:42 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  532.017955][ T3240] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  532.052022][ T3241] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:43 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:43 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000018ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:43 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x68000000)

[  532.272276][ T3255] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  532.283385][ T3258] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:43 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x4, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  532.371383][ T3261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  532.511230][ T3266] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:43 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r2)

14:19:43 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:43 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:43 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:43 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x6c000000)

14:19:43 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000019ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:43 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  532.767773][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  532.798510][ T3281] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:43 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x6, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  532.861355][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:43 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000001affffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:43 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:43 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:43 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x74000000)

[  533.179786][ T3315] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  533.244417][ T3324] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  533.297305][ T3325] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  533.321567][ T3326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:44 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)

14:19:44 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x7, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:44 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:44 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:44 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000001bffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:44 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x7a000000)

14:19:44 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x8, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  533.621408][ T3344] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  533.642682][ T3343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:44 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:44 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  533.711253][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  533.739950][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:44 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x81000000)

14:19:44 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)

14:19:44 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000003fffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:44 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x9, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:44 executing program 2:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:44 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:45 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x88a8ffff)

[  534.174792][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  534.199724][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  534.246286][ T3393] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:45 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xa, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:45 executing program 2:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:45 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431602000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:45 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:45 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x9effffff)

14:19:45 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xb, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:45 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)

14:19:45 executing program 2:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:45 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:45 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431603000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:45 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xc, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:45 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa0004000)

14:19:46 executing program 2:
r0 = socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:46 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xd, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:46 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431604000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:46 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:46 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)=r2)

14:19:46 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431605000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:46 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa0008000)

14:19:46 executing program 2:
r0 = socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:46 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xe, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:46 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:46 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431606000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:46 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa000a000)

14:19:46 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xf, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:46 executing program 2:
r0 = socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:46 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:46 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x10, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:47 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)=r2)

14:19:47 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431607000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:47 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa0010000)

14:19:47 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:47 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:47 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x11, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:47 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:47 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160a000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:47 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:47 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xc3ffffff)

14:19:47 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)=r2)

14:19:47 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x12, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:47 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:47 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:47 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160c000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:47 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x13, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:47 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xf0ffffff)

14:19:47 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x35, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:48 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160e000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:48 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:48 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x14, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:48 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:48 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000140)=r1)

14:19:48 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xfcffffff)

14:19:48 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x15, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:48 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160f000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:48 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:48 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:48 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x16, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:48 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffa888)

14:19:48 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:48 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000140)=r1)

14:19:48 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431610000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:48 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:48 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x17, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:48 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:48 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431648000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:48 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xfffff000)

14:19:48 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0)

14:19:49 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x18, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:49 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:49 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43164c000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:49 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffff7f)

14:19:49 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000140)=r1)

14:19:49 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0)

14:19:49 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:49 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffff9e)

14:19:49 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:49 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431660000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:49 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0)

14:19:49 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:49 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431668000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:49 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x24, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:49 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffffc3)

14:19:49 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:50 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:50 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:50 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:50 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43166c000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:50 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xfffffff0)

14:19:50 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:50 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:50 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x44, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:50 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:50 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431674000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:50 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xfffffffc)

14:19:50 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:51 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:51 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5c, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:51 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:51 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x1a0ffffffff)

14:19:51 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43167a000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:51 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:51 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x60, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:51 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:51 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:51 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316f0000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:51 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x64, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:51 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4000a0ffffffff)

14:19:51 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:51 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:51 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:51 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600030040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:51 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x8000a0ffffffff)

14:19:51 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x7c, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:51 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:51 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600050040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:52 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:52 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x84, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:52 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa000a0ffffffff)

14:19:52 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:52 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:52 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600060040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:52 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x9c, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:52 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:52 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:52 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600070040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:52 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xa0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:52 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xf0ffffffffffff)

14:19:52 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:52 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:52 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431656080040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:53 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140))

14:19:53 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xa4, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:53 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x100000000000000)

14:19:53 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:53 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:53 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000a0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  542.374311][ T3959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:53 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:53 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000c0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:53 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:53 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xbc, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  542.472755][ T3967] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:53 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x200000000000000)

14:19:53 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140))

14:19:53 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000e0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:53 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xc0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:53 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  542.770885][ T3984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:53 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  542.871516][ T3993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:53 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140))

14:19:53 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xc4, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:53 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000f0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:53 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x300000000000000)

14:19:54 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:54 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:54 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600200040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  543.246464][ T4019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:54 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xdc, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:54 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  543.341425][ T4024] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:54 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:54 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x400000000000000)

14:19:54 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xe0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:54 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316003f0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  543.634244][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:54 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  543.685124][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:54 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:54 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:54 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xe4, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:54 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600400040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:54 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x500000000000000)

14:19:54 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:54 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:54 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xfc, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  544.076232][ T4079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  544.117031][ T4083] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:55 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x600000000000000)

14:19:55 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:55 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600480040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:55 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x180, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:55 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:55 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0)

[  544.399152][ T4099] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:55 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:55 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1a0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:55 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0)

[  544.531142][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:55 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316004c0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:55 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x700000000000000)

14:19:55 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:55 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0)

14:19:55 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:55 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431608560040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  544.876902][ T4139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:55 executing program 5:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:55 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:55 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x500, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:55 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  544.990555][ T4139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:56 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa00000000000000)

14:19:56 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:56 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431665580040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:56 executing program 5:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:56 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x600, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:56 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  545.353829][ T4174] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:56 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:56 executing program 5:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:56 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600600040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  545.480976][ T4183] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:56 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x700, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:56 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x53, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:56 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:56 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xc00000000000000)

14:19:56 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:56 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431658650040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:56 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x900, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:56 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:56 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  545.916746][ T4219] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:56 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600680040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:56 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  546.047378][ T4228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:57 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:57 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xa00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:57 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:57 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xe00000000000000)

14:19:57 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:57 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xb00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:57 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316006c0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:57 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  546.338431][ T4250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:57 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  546.451343][ T4258] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:57 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:57 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:57 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xf00000000000000)

14:19:57 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:57 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600740040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:57 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:57 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  546.751262][ T4281] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:57 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316007a0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:57 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xd00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  546.881225][ T4294] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:57 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:57 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:57 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x1000000000000000)

14:19:58 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:58 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600810040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:58 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:58 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xe00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:58 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  547.217351][ T4316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  547.301804][ T4316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:58 executing program 2:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:58 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xf00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:58 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:58 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600f00040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:58 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x2000000000000000)

14:19:58 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:58 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:58 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  547.650675][ T4350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:58 executing program 2:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:58 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000051ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:58 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  547.781116][ T4361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:58 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:58 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  547.928215][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:58 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x3f00000000000000)

[  547.984178][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:58 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:58 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  548.085095][ T4382] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:59 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:59 executing program 2:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:59 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600020040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  548.184524][ T4386] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:59 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:59 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  548.306596][ T4398] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:59 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:19:59 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4000000000000000)

14:19:59 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600030040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:59 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1500, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:19:59 executing program 2 (fault-call:0 fault-nth:0):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  548.653974][ T4419] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:19:59 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:19:59 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  548.764952][ T4425] FAULT_INJECTION: forcing a failure.
[  548.764952][ T4425] name failslab, interval 1, probability 0, space 0, times 0
[  548.811724][ T4432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  548.852760][ T4425] CPU: 0 PID: 4425 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  548.861798][ T4425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  548.872664][ T4425] Call Trace:
[  548.877106][ T4425]  dump_stack+0x197/0x210
[  548.881472][ T4425]  should_fail.cold+0xa/0x15
[  548.886483][ T4425]  ? fault_create_debugfs_attr+0x180/0x180
[  548.892670][ T4425]  ? ___might_sleep+0x163/0x2c0
[  548.898096][ T4425]  __should_failslab+0x121/0x190
[  548.903079][ T4425]  should_failslab+0x9/0x14
[  548.907605][ T4425]  kmem_cache_alloc_node_trace+0x274/0x750
[  548.913443][ T4425]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  548.920388][ T4425]  ? cap_capable+0x205/0x270
[  548.925329][ T4425]  __kmalloc_node+0x3d/0x70
[  548.930458][ T4425]  __bpf_map_area_alloc+0xbd/0xf0
[  548.935849][ T4425]  bpf_map_area_alloc+0x20/0x30
[  548.940795][ T4425]  array_map_alloc+0x4bc/0x7d0
[  548.945661][ T4425]  ? array_of_map_free+0x50/0x50
[  548.951131][ T4425]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  548.957380][ T4425]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  548.963793][ T4425]  ? array_of_map_free+0x50/0x50
[  548.968806][ T4425]  __do_sys_bpf+0x478/0x3610
[  548.973814][ T4425]  ? bpf_prog_load+0x1960/0x1960
[  548.982787][ T4425]  ? __kasan_check_write+0x14/0x20
[  548.988069][ T4425]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  548.993788][ T4425]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  548.999155][ T4425]  ? wait_for_completion+0x440/0x440
[  549.004571][ T4425]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  549.010846][ T4425]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  549.016412][ T4425]  ? do_syscall_64+0x26/0x790
[  549.021354][ T4425]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  549.027961][ T4425]  ? do_syscall_64+0x26/0x790
[  549.032654][ T4425]  __x64_sys_bpf+0x73/0xb0
[  549.037072][ T4425]  do_syscall_64+0xfa/0x790
[  549.041863][ T4425]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  549.048176][ T4425] RIP: 0033:0x45a919
[  549.052059][ T4425] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  549.071653][ T4425] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  549.080355][ T4425] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  549.088834][ T4425] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
14:19:59 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600040040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:19:59 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1600, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  549.097072][ T4425] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  549.106616][ T4425] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  549.114832][ T4425] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:00 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4800000000000000)

14:20:00 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:00 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1700, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:00 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600050040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:00 executing program 2 (fault-call:0 fault-nth:1):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:00 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  549.338879][ T4451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  549.416966][ T4461] FAULT_INJECTION: forcing a failure.
[  549.416966][ T4461] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  549.447441][ T4461] CPU: 1 PID: 4461 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  549.456352][ T4461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  549.466421][ T4461] Call Trace:
[  549.469742][ T4461]  dump_stack+0x197/0x210
[  549.474095][ T4461]  should_fail.cold+0xa/0x15
[  549.478718][ T4461]  ? fault_create_debugfs_attr+0x180/0x180
[  549.484558][ T4461]  ? ___might_sleep+0x163/0x2c0
[  549.489436][ T4461]  should_fail_alloc_page+0x50/0x60
[  549.494670][ T4461]  __alloc_pages_nodemask+0x1a1/0x910
[  549.500213][ T4461]  ? __alloc_pages_slowpath+0x2920/0x2920
[  549.505963][ T4461]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  549.512410][ T4461]  ? find_next_bit+0x107/0x130
[  549.517214][ T4461]  pcpu_populate_chunk+0xf8/0x940
[  549.522250][ T4461]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  549.531197][ T4461]  ? find_next_bit+0xc7/0x130
[  549.535892][ T4461]  pcpu_alloc+0xd5b/0x1380
[  549.540555][ T4461]  ? pcpu_alloc_area+0x820/0x820
[  549.546317][ T4461]  __alloc_percpu_gfp+0x28/0x30
[  549.552073][ T4461]  array_map_alloc+0x698/0x7d0
[  549.556956][ T4461]  ? array_of_map_free+0x50/0x50
[  549.562005][ T4461]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  549.568275][ T4461]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  549.574564][ T4461]  ? array_of_map_free+0x50/0x50
[  549.579523][ T4461]  __do_sys_bpf+0x478/0x3610
[  549.584137][ T4461]  ? bpf_prog_load+0x1960/0x1960
[  549.589333][ T4461]  ? __kasan_check_write+0x14/0x20
[  549.594660][ T4461]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  549.600285][ T4461]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  549.606134][ T4461]  ? wait_for_completion+0x440/0x440
[  549.611534][ T4461]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  549.617794][ T4461]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  549.623365][ T4461]  ? do_syscall_64+0x26/0x790
[  549.628587][ T4461]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  549.634680][ T4461]  ? do_syscall_64+0x26/0x790
[  549.639630][ T4461]  __x64_sys_bpf+0x73/0xb0
[  549.644069][ T4461]  do_syscall_64+0xfa/0x790
[  549.648668][ T4461]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  549.654570][ T4461] RIP: 0033:0x45a919
[  549.658898][ T4461] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  549.679110][ T4461] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  549.687536][ T4461] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  549.695779][ T4461] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  549.704119][ T4461] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
14:20:00 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1800, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  549.712186][ T4461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  549.720435][ T4461] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:00 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600060040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:00 executing program 2 (fault-call:0 fault-nth:2):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:00 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:00 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:00 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  549.991934][ T4485] FAULT_INJECTION: forcing a failure.
[  549.991934][ T4485] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  550.036446][ T4485] CPU: 1 PID: 4485 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  550.045093][ T4485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  550.055255][ T4485] Call Trace:
[  550.058750][ T4485]  dump_stack+0x197/0x210
[  550.063116][ T4485]  should_fail.cold+0xa/0x15
[  550.067734][ T4485]  ? fault_create_debugfs_attr+0x180/0x180
[  550.073559][ T4485]  ? ___might_sleep+0x163/0x2c0
[  550.078467][ T4485]  should_fail_alloc_page+0x50/0x60
[  550.083687][ T4485]  __alloc_pages_nodemask+0x1a1/0x910
[  550.089069][ T4485]  ? __alloc_pages_slowpath+0x2920/0x2920
[  550.094802][ T4485]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  550.101224][ T4485]  ? find_next_bit+0x107/0x130
[  550.105985][ T4485]  pcpu_populate_chunk+0xf8/0x940
[  550.111033][ T4485]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  550.117040][ T4485]  ? find_next_bit+0xc7/0x130
[  550.121758][ T4485]  pcpu_alloc+0xd5b/0x1380
[  550.126297][ T4485]  ? pcpu_alloc_area+0x820/0x820
[  550.131288][ T4485]  __alloc_percpu_gfp+0x28/0x30
[  550.136153][ T4485]  array_map_alloc+0x698/0x7d0
[  550.140921][ T4485]  ? array_of_map_free+0x50/0x50
[  550.145852][ T4485]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  550.152081][ T4485]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  550.158319][ T4485]  ? array_of_map_free+0x50/0x50
[  550.163278][ T4485]  __do_sys_bpf+0x478/0x3610
[  550.167858][ T4485]  ? bpf_prog_load+0x1960/0x1960
[  550.172788][ T4485]  ? __kasan_check_write+0x14/0x20
[  550.177886][ T4485]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  550.183428][ T4485]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  550.188723][ T4485]  ? wait_for_completion+0x440/0x440
[  550.194030][ T4485]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  550.201001][ T4485]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  550.206488][ T4485]  ? do_syscall_64+0x26/0x790
[  550.211352][ T4485]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  550.217448][ T4485]  ? do_syscall_64+0x26/0x790
[  550.222259][ T4485]  __x64_sys_bpf+0x73/0xb0
[  550.226678][ T4485]  do_syscall_64+0xfa/0x790
[  550.231262][ T4485]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  550.237162][ T4485] RIP: 0033:0x45a919
[  550.241663][ T4485] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  550.261982][ T4485] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  550.270592][ T4485] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  550.278580][ T4485] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  550.286546][ T4485] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  550.294785][ T4485] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  550.302930][ T4485] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:01 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4901000000000000)

14:20:01 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:01 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600070040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:01 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:01 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  550.495983][ T4496] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:01 executing program 2 (fault-call:0 fault-nth:3):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:01 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  550.581215][ T4508] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:01 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000a0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:01 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4c00000000000000)

14:20:01 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  550.706946][ T4514] FAULT_INJECTION: forcing a failure.
[  550.706946][ T4514] name fail_page_alloc, interval 1, probability 0, space 0, times 0
14:20:01 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  550.797599][ T4514] CPU: 0 PID: 4514 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  550.806232][ T4514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  550.816293][ T4514] Call Trace:
[  550.819606][ T4514]  dump_stack+0x197/0x210
[  550.823951][ T4514]  should_fail.cold+0xa/0x15
[  550.828554][ T4514]  ? fault_create_debugfs_attr+0x180/0x180
[  550.834370][ T4514]  ? ___might_sleep+0x163/0x2c0
[  550.839243][ T4514]  should_fail_alloc_page+0x50/0x60
14:20:01 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3f00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  550.844444][ T4514]  __alloc_pages_nodemask+0x1a1/0x910
[  550.849826][ T4514]  ? __alloc_pages_slowpath+0x2920/0x2920
[  550.855567][ T4514]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  550.861813][ T4514]  ? find_next_bit+0x107/0x130
[  550.866591][ T4514]  pcpu_populate_chunk+0xf8/0x940
[  550.871619][ T4514]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  550.877347][ T4514]  ? find_next_bit+0xc7/0x130
[  550.882045][ T4514]  pcpu_alloc+0xd5b/0x1380
[  550.886487][ T4514]  ? pcpu_alloc_area+0x820/0x820
14:20:01 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x4000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  550.886864][ T4528] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  550.891448][ T4514]  __alloc_percpu_gfp+0x28/0x30
[  550.891466][ T4514]  array_map_alloc+0x698/0x7d0
[  550.891487][ T4514]  ? array_of_map_free+0x50/0x50
[  550.891513][ T4514]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  550.919523][ T4514]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  550.925776][ T4514]  ? array_of_map_free+0x50/0x50
[  550.930732][ T4514]  __do_sys_bpf+0x478/0x3610
[  550.935338][ T4514]  ? bpf_prog_load+0x1960/0x1960
[  550.940285][ T4514]  ? __kasan_check_write+0x14/0x20
[  550.945405][ T4514]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  550.950955][ T4514]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  550.956250][ T4514]  ? wait_for_completion+0x440/0x440
[  550.961553][ T4514]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  550.967826][ T4514]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  550.973394][ T4514]  ? do_syscall_64+0x26/0x790
[  550.978076][ T4514]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  550.984149][ T4514]  ? do_syscall_64+0x26/0x790
[  550.988843][ T4514]  __x64_sys_bpf+0x73/0xb0
[  550.993270][ T4514]  do_syscall_64+0xfa/0x790
14:20:01 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000c0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:01 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x4400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  550.997779][ T4514]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  551.003679][ T4514] RIP: 0033:0x45a919
[  551.007587][ T4514] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  551.027193][ T4514] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  551.035608][ T4514] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
14:20:01 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  551.043583][ T4514] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  551.051578][ T4514] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  551.059550][ T4514] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  551.067524][ T4514] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
[  551.118768][ T4525] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:02 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:02 executing program 2 (fault-call:0 fault-nth:4):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:02 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:02 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x6000000000000000)

14:20:02 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x6000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:02 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000e0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  551.436952][ T4565] FAULT_INJECTION: forcing a failure.
[  551.436952][ T4565] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  551.454617][ T4568] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:02 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x6400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  551.483980][ T4565] CPU: 0 PID: 4565 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  551.492597][ T4565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  551.502655][ T4565] Call Trace:
[  551.505955][ T4565]  dump_stack+0x197/0x210
[  551.510308][ T4565]  should_fail.cold+0xa/0x15
[  551.514916][ T4565]  ? fault_create_debugfs_attr+0x180/0x180
[  551.520737][ T4565]  ? ___might_sleep+0x163/0x2c0
[  551.525609][ T4565]  should_fail_alloc_page+0x50/0x60
14:20:02 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x7c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  551.530817][ T4565]  __alloc_pages_nodemask+0x1a1/0x910
[  551.536200][ T4565]  ? __alloc_pages_slowpath+0x2920/0x2920
[  551.541937][ T4565]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  551.548182][ T4565]  ? find_next_bit+0x107/0x130
[  551.552966][ T4565]  pcpu_populate_chunk+0xf8/0x940
[  551.557996][ T4565]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  551.563726][ T4565]  ? find_next_bit+0xc7/0x130
[  551.568422][ T4565]  pcpu_alloc+0xd5b/0x1380
[  551.572859][ T4565]  ? pcpu_alloc_area+0x820/0x820
[  551.577824][ T4565]  __alloc_percpu_gfp+0x28/0x30
14:20:02 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x8400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  551.582684][ T4565]  array_map_alloc+0x698/0x7d0
[  551.587455][ T4565]  ? array_of_map_free+0x50/0x50
[  551.592394][ T4565]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  551.598636][ T4565]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  551.604887][ T4565]  ? array_of_map_free+0x50/0x50
[  551.609839][ T4565]  __do_sys_bpf+0x478/0x3610
[  551.614441][ T4565]  ? bpf_prog_load+0x1960/0x1960
[  551.619385][ T4565]  ? __kasan_check_write+0x14/0x20
[  551.624502][ T4565]  ? __mutex_unlock_slowpath+0xf0/0x6a0
14:20:02 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x9c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  551.630049][ T4565]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  551.635339][ T4565]  ? wait_for_completion+0x440/0x440
[  551.640632][ T4565]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  551.646895][ T4565]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  551.652360][ T4565]  ? do_syscall_64+0x26/0x790
[  551.657044][ T4565]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  551.663119][ T4565]  ? do_syscall_64+0x26/0x790
[  551.667839][ T4565]  __x64_sys_bpf+0x73/0xb0
[  551.672264][ T4565]  do_syscall_64+0xfa/0x790
[  551.676882][ T4565]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
14:20:02 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000f0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:02 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xa000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  551.682775][ T4565] RIP: 0033:0x45a919
[  551.686671][ T4565] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  551.706272][ T4565] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  551.714683][ T4565] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  551.722656][ T4565] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
14:20:02 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  551.730629][ T4565] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  551.738607][ T4565] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  551.746579][ T4565] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:02 executing program 2 (fault-call:0 fault-nth:5):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:02 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xa400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  551.912289][ T4568] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:02 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x6558000000000000)

14:20:02 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:02 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600100040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:02 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  552.066700][ T4607] FAULT_INJECTION: forcing a failure.
[  552.066700][ T4607] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  552.099151][ T4607] CPU: 1 PID: 4607 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
14:20:03 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xbc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  552.107797][ T4607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  552.117860][ T4607] Call Trace:
[  552.121172][ T4607]  dump_stack+0x197/0x210
[  552.125529][ T4607]  should_fail.cold+0xa/0x15
[  552.130140][ T4607]  ? fault_create_debugfs_attr+0x180/0x180
[  552.135961][ T4607]  ? ___might_sleep+0x163/0x2c0
[  552.140842][ T4607]  should_fail_alloc_page+0x50/0x60
[  552.146056][ T4607]  __alloc_pages_nodemask+0x1a1/0x910
[  552.151441][ T4607]  ? __alloc_pages_slowpath+0x2920/0x2920
[  552.157182][ T4607]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
14:20:03 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600480040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  552.163442][ T4607]  ? find_next_bit+0x107/0x130
[  552.168231][ T4607]  pcpu_populate_chunk+0xf8/0x940
[  552.173270][ T4607]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  552.179002][ T4607]  ? find_next_bit+0xc7/0x130
[  552.183701][ T4607]  pcpu_alloc+0xd5b/0x1380
[  552.188138][ T4607]  ? pcpu_alloc_area+0x820/0x820
[  552.193102][ T4607]  __alloc_percpu_gfp+0x28/0x30
[  552.197970][ T4607]  array_map_alloc+0x698/0x7d0
[  552.202753][ T4607]  ? array_of_map_free+0x50/0x50
[  552.207711][ T4607]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  552.213970][ T4607]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  552.215662][ T4622] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  552.220219][ T4607]  ? array_of_map_free+0x50/0x50
[  552.220235][ T4607]  __do_sys_bpf+0x478/0x3610
[  552.220255][ T4607]  ? bpf_prog_load+0x1960/0x1960
[  552.220271][ T4607]  ? __kasan_check_write+0x14/0x20
[  552.220284][ T4607]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  552.220300][ T4607]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  552.220314][ T4607]  ? wait_for_completion+0x440/0x440
[  552.220337][ T4607]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  552.220368][ T4607]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  552.220381][ T4607]  ? do_syscall_64+0x26/0x790
[  552.220393][ T4607]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  552.220404][ T4607]  ? do_syscall_64+0x26/0x790
[  552.220423][ T4607]  __x64_sys_bpf+0x73/0xb0
[  552.220438][ T4607]  do_syscall_64+0xfa/0x790
[  552.220457][ T4607]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  552.220469][ T4607] RIP: 0033:0x45a919
[  552.220483][ T4607] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  552.220489][ T4607] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  552.220503][ T4607] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  552.220511][ T4607] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  552.220527][ T4607] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
14:20:03 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xc000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:03 executing program 2 (fault-call:0 fault-nth:6):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  552.252831][ T4607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  552.252840][ T4607] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
[  552.427087][ T4628] FAULT_INJECTION: forcing a failure.
[  552.427087][ T4628] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  552.450468][ T4630] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  552.468074][ T4628] CPU: 0 PID: 4628 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
14:20:03 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x65, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:03 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xc400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  552.476708][ T4628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  552.486781][ T4628] Call Trace:
[  552.490089][ T4628]  dump_stack+0x197/0x210
[  552.494447][ T4628]  should_fail.cold+0xa/0x15
[  552.499058][ T4628]  ? fault_create_debugfs_attr+0x180/0x180
[  552.504882][ T4628]  ? ___might_sleep+0x163/0x2c0
[  552.509765][ T4628]  should_fail_alloc_page+0x50/0x60
[  552.514987][ T4628]  __alloc_pages_nodemask+0x1a1/0x910
[  552.520373][ T4628]  ? __alloc_pages_slowpath+0x2920/0x2920
14:20:03 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xdc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  552.526115][ T4628]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  552.532395][ T4628]  ? find_next_bit+0x107/0x130
[  552.537182][ T4628]  pcpu_populate_chunk+0xf8/0x940
[  552.542218][ T4628]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  552.547950][ T4628]  ? find_next_bit+0xc7/0x130
[  552.552647][ T4628]  pcpu_alloc+0xd5b/0x1380
[  552.557088][ T4628]  ? pcpu_alloc_area+0x820/0x820
[  552.562050][ T4628]  __alloc_percpu_gfp+0x28/0x30
[  552.566909][ T4628]  array_map_alloc+0x698/0x7d0
[  552.571691][ T4628]  ? array_of_map_free+0x50/0x50
14:20:03 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xe000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  552.576647][ T4628]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  552.582898][ T4628]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  552.589147][ T4628]  ? array_of_map_free+0x50/0x50
[  552.594092][ T4628]  __do_sys_bpf+0x478/0x3610
[  552.598691][ T4628]  ? bpf_prog_load+0x1960/0x1960
[  552.603622][ T4628]  ? __kasan_check_write+0x14/0x20
[  552.608730][ T4628]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  552.614291][ T4628]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  552.619584][ T4628]  ? wait_for_completion+0x440/0x440
[  552.624879][ T4628]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  552.631142][ T4628]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  552.636610][ T4628]  ? do_syscall_64+0x26/0x790
[  552.641292][ T4628]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  552.647353][ T4628]  ? do_syscall_64+0x26/0x790
[  552.652036][ T4628]  __x64_sys_bpf+0x73/0xb0
[  552.656462][ T4628]  do_syscall_64+0xfa/0x790
[  552.660983][ T4628]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  552.666874][ T4628] RIP: 0033:0x45a919
14:20:03 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x6800000000000000)

14:20:03 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xe400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:03 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  552.670761][ T4628] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  552.690476][ T4628] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  552.698902][ T4628] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  552.706879][ T4628] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  552.714854][ T4628] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
14:20:03 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316004c0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  552.722832][ T4628] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  552.730805][ T4628] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:03 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xfc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  552.825671][ T4655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:03 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:03 executing program 2 (fault-call:0 fault-nth:7):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:03 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  552.972620][ T4655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:03 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600600040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:04 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x6c00000000000000)

14:20:04 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x10400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  553.079175][ T4670] FAULT_INJECTION: forcing a failure.
[  553.079175][ T4670] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  553.142608][ T4670] CPU: 1 PID: 4670 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  553.151235][ T4670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  553.151241][ T4670] Call Trace:
[  553.151267][ T4670]  dump_stack+0x197/0x210
[  553.151290][ T4670]  should_fail.cold+0xa/0x15
[  553.151309][ T4670]  ? fault_create_debugfs_attr+0x180/0x180
[  553.151327][ T4670]  ? ___might_sleep+0x163/0x2c0
[  553.151351][ T4670]  should_fail_alloc_page+0x50/0x60
[  553.189417][ T4670]  __alloc_pages_nodemask+0x1a1/0x910
[  553.194812][ T4670]  ? __alloc_pages_slowpath+0x2920/0x2920
[  553.200557][ T4670]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  553.206796][ T4670]  ? find_next_bit+0x107/0x130
[  553.206821][ T4670]  pcpu_populate_chunk+0xf8/0x940
[  553.206840][ T4670]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  553.222356][ T4670]  ? find_next_bit+0xc7/0x130
[  553.227069][ T4670]  pcpu_alloc+0xd5b/0x1380
[  553.231515][ T4670]  ? pcpu_alloc_area+0x820/0x820
[  553.236483][ T4670]  __alloc_percpu_gfp+0x28/0x30
[  553.241337][ T4670]  array_map_alloc+0x698/0x7d0
[  553.241361][ T4670]  ? array_of_map_free+0x50/0x50
[  553.241380][ T4670]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  553.241393][ T4670]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  553.241408][ T4670]  ? array_of_map_free+0x50/0x50
[  553.241424][ T4670]  __do_sys_bpf+0x478/0x3610
[  553.241441][ T4670]  ? bpf_prog_load+0x1960/0x1960
[  553.241459][ T4670]  ? __kasan_check_write+0x14/0x20
[  553.257508][ T4670]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  553.257527][ T4670]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  553.257544][ T4670]  ? wait_for_completion+0x440/0x440
[  553.257566][ T4670]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  553.257595][ T4670]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  553.265395][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  553.268748][ T4670]  ? do_syscall_64+0x26/0x790
[  553.268765][ T4670]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  553.268783][ T4670]  ? do_syscall_64+0x26/0x790
[  553.333791][ T4670]  __x64_sys_bpf+0x73/0xb0
[  553.338228][ T4670]  do_syscall_64+0xfa/0x790
14:20:04 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x11c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  553.342755][ T4670]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  553.348655][ T4670] RIP: 0033:0x45a919
[  553.352558][ T4670] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  553.372169][ T4670] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  553.380600][ T4670] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
14:20:04 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x12000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  553.388582][ T4670] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  553.396561][ T4670] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  553.404545][ T4670] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  553.412517][ T4670] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:04 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:04 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:04 executing program 2 (fault-call:0 fault-nth:8):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  553.470911][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:04 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600680040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:04 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x7400000000000000)

14:20:04 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:04 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x12400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  553.681729][ T4708] FAULT_INJECTION: forcing a failure.
[  553.681729][ T4708] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  553.783768][ T4708] CPU: 1 PID: 4708 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  553.792406][ T4708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  553.802470][ T4708] Call Trace:
[  553.805778][ T4708]  dump_stack+0x197/0x210
[  553.807625][ T4721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  553.810120][ T4708]  should_fail.cold+0xa/0x15
[  553.810140][ T4708]  ? fault_create_debugfs_attr+0x180/0x180
[  553.810162][ T4708]  ? ___might_sleep+0x163/0x2c0
[  553.810191][ T4708]  should_fail_alloc_page+0x50/0x60
[  553.810205][ T4708]  __alloc_pages_nodemask+0x1a1/0x910
[  553.810224][ T4708]  ? __alloc_pages_slowpath+0x2920/0x2920
[  553.810245][ T4708]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  553.810263][ T4708]  ? find_next_bit+0x107/0x130
[  553.860059][ T4708]  pcpu_populate_chunk+0xf8/0x940
[  553.865121][ T4708]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  553.870862][ T4708]  ? find_next_bit+0xc7/0x130
[  553.875584][ T4708]  pcpu_alloc+0xd5b/0x1380
[  553.880034][ T4708]  ? pcpu_alloc_area+0x820/0x820
[  553.885004][ T4708]  __alloc_percpu_gfp+0x28/0x30
[  553.889881][ T4708]  array_map_alloc+0x698/0x7d0
[  553.894673][ T4708]  ? array_of_map_free+0x50/0x50
[  553.899631][ T4708]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  553.905875][ T4708]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  553.912119][ T4708]  ? array_of_map_free+0x50/0x50
[  553.917081][ T4708]  __do_sys_bpf+0x478/0x3610
[  553.921686][ T4708]  ? bpf_prog_load+0x1960/0x1960
[  553.926630][ T4708]  ? __kasan_check_write+0x14/0x20
[  553.931745][ T4708]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  553.937301][ T4708]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  553.942590][ T4708]  ? wait_for_completion+0x440/0x440
[  553.947876][ T4708]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  553.947910][ T4708]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  553.959593][ T4708]  ? do_syscall_64+0x26/0x790
[  553.964277][ T4708]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  553.970354][ T4708]  ? do_syscall_64+0x26/0x790
[  553.975048][ T4708]  __x64_sys_bpf+0x73/0xb0
[  553.979472][ T4708]  do_syscall_64+0xfa/0x790
14:20:04 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x13c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:04 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316006c0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:04 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x14400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  553.983990][ T4708]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  553.989877][ T4708] RIP: 0033:0x45a919
[  553.989893][ T4708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  553.989901][ T4708] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  553.989916][ T4708] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  553.989925][ T4708] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  553.989933][ T4708] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  553.989942][ T4708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  553.989950][ T4708] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:05 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:05 executing program 2 (fault-call:0 fault-nth:9):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:05 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:05 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x15c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:05 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600740040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:05 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  554.170551][ T4717] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  554.247999][ T4734] FAULT_INJECTION: forcing a failure.
[  554.247999][ T4734] name fail_page_alloc, interval 1, probability 0, space 0, times 0
14:20:05 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x7a00000000000000)

[  554.317520][ T4734] CPU: 1 PID: 4734 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  554.326265][ T4734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  554.326272][ T4734] Call Trace:
[  554.326299][ T4734]  dump_stack+0x197/0x210
[  554.326322][ T4734]  should_fail.cold+0xa/0x15
[  554.326341][ T4734]  ? fault_create_debugfs_attr+0x180/0x180
[  554.326358][ T4734]  ? ___might_sleep+0x163/0x2c0
[  554.326384][ T4734]  should_fail_alloc_page+0x50/0x60
[  554.326397][ T4734]  __alloc_pages_nodemask+0x1a1/0x910
[  554.326417][ T4734]  ? __alloc_pages_slowpath+0x2920/0x2920
[  554.326441][ T4734]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  554.381804][ T4734]  ? find_next_bit+0x107/0x130
[  554.381830][ T4734]  pcpu_populate_chunk+0xf8/0x940
[  554.381845][ T4734]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  554.381856][ T4734]  ? find_next_bit+0xc7/0x130
[  554.381879][ T4734]  pcpu_alloc+0xd5b/0x1380
[  554.381904][ T4734]  ? pcpu_alloc_area+0x820/0x820
[  554.381931][ T4734]  __alloc_percpu_gfp+0x28/0x30
[  554.416213][ T4734]  array_map_alloc+0x698/0x7d0
[  554.420980][ T4734]  ? array_of_map_free+0x50/0x50
[  554.421008][ T4734]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  554.421027][ T4734]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  554.421041][ T4734]  ? array_of_map_free+0x50/0x50
[  554.421058][ T4734]  __do_sys_bpf+0x478/0x3610
[  554.421079][ T4734]  ? bpf_prog_load+0x1960/0x1960
[  554.421093][ T4734]  ? __kasan_check_write+0x14/0x20
[  554.421111][ T4734]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  554.455426][ T4757] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  554.458111][ T4734]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  554.458130][ T4734]  ? wait_for_completion+0x440/0x440
[  554.458155][ T4734]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  554.458191][ T4734]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  554.493229][ T4734]  ? do_syscall_64+0x26/0x790
[  554.497916][ T4734]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  554.503987][ T4734]  ? do_syscall_64+0x26/0x790
[  554.508682][ T4734]  __x64_sys_bpf+0x73/0xb0
[  554.513110][ T4734]  do_syscall_64+0xfa/0x790
[  554.517739][ T4734]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  554.523635][ T4734] RIP: 0033:0x45a919
[  554.527539][ T4734] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  554.547148][ T4734] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  554.555572][ T4734] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
14:20:05 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316007a0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:05 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x16400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  554.563549][ T4734] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  554.571524][ T4734] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  554.579521][ T4734] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  554.587493][ T4734] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:05 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x17c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:05 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:05 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:05 executing program 2 (fault-call:0 fault-nth:10):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:05 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600f00040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  554.841485][ T4753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:05 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  554.981708][ T4784] FAULT_INJECTION: forcing a failure.
[  554.981708][ T4784] name fail_page_alloc, interval 1, probability 0, space 0, times 0
14:20:05 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x18400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:05 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x8100000000000000)

14:20:06 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000340ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  555.185504][ T4784] CPU: 1 PID: 4784 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  555.194131][ T4784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  555.204188][ T4784] Call Trace:
[  555.207486][ T4784]  dump_stack+0x197/0x210
[  555.208728][ T4801] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  555.211827][ T4784]  should_fail.cold+0xa/0x15
[  555.211849][ T4784]  ? fault_create_debugfs_attr+0x180/0x180
[  555.211864][ T4784]  ? ___might_sleep+0x163/0x2c0
[  555.211893][ T4784]  should_fail_alloc_page+0x50/0x60
[  555.211905][ T4784]  __alloc_pages_nodemask+0x1a1/0x910
[  555.211924][ T4784]  ? __alloc_pages_slowpath+0x2920/0x2920
[  555.250631][ T4784]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  555.256874][ T4784]  ? find_next_bit+0x107/0x130
[  555.261653][ T4784]  pcpu_populate_chunk+0xf8/0x940
[  555.266667][ T4784]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  555.272372][ T4784]  ? find_next_bit+0xc7/0x130
[  555.277038][ T4784]  pcpu_alloc+0xd5b/0x1380
[  555.281446][ T4784]  ? pcpu_alloc_area+0x820/0x820
[  555.286375][ T4784]  __alloc_percpu_gfp+0x28/0x30
[  555.291213][ T4784]  array_map_alloc+0x698/0x7d0
[  555.295960][ T4784]  ? array_of_map_free+0x50/0x50
[  555.300884][ T4784]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  555.307108][ T4784]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  555.313344][ T4784]  ? array_of_map_free+0x50/0x50
[  555.318274][ T4784]  __do_sys_bpf+0x478/0x3610
[  555.322848][ T4784]  ? bpf_prog_load+0x1960/0x1960
[  555.327777][ T4784]  ? __kasan_check_write+0x14/0x20
[  555.332921][ T4784]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  555.338445][ T4784]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  555.343735][ T4784]  ? wait_for_completion+0x440/0x440
[  555.349022][ T4784]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  555.355263][ T4784]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  555.360713][ T4784]  ? do_syscall_64+0x26/0x790
[  555.365381][ T4784]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  555.371492][ T4784]  ? do_syscall_64+0x26/0x790
[  555.376164][ T4784]  __x64_sys_bpf+0x73/0xb0
[  555.380569][ T4784]  do_syscall_64+0xfa/0x790
[  555.385064][ T4784]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  555.390961][ T4784] RIP: 0033:0x45a919
[  555.394857][ T4784] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  555.414449][ T4784] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  555.422854][ T4784] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
14:20:06 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x19c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:06 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  555.430826][ T4784] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  555.438784][ T4784] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  555.446743][ T4784] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  555.454693][ T4784] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:06 executing program 2 (fault-call:0 fault-nth:11):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:06 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  555.570639][ T4799] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:06 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1a400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:06 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000540ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:06 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  555.695189][ T4817] FAULT_INJECTION: forcing a failure.
[  555.695189][ T4817] name fail_page_alloc, interval 1, probability 0, space 0, times 0
14:20:06 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x88a8ffff00000000)

[  555.749375][ T4817] CPU: 1 PID: 4817 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  555.758019][ T4817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  555.758026][ T4817] Call Trace:
[  555.758053][ T4817]  dump_stack+0x197/0x210
[  555.758084][ T4817]  should_fail.cold+0xa/0x15
[  555.780988][ T4817]  ? fault_create_debugfs_attr+0x180/0x180
[  555.787158][ T4817]  ? ___might_sleep+0x163/0x2c0
[  555.792239][ T4817]  should_fail_alloc_page+0x50/0x60
[  555.798165][ T4817]  __alloc_pages_nodemask+0x1a1/0x910
[  555.803586][ T4817]  ? __alloc_pages_slowpath+0x2920/0x2920
[  555.809336][ T4817]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  555.815594][ T4817]  ? find_next_bit+0x107/0x130
[  555.820652][ T4817]  pcpu_populate_chunk+0xf8/0x940
[  555.825692][ T4817]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  555.825709][ T4817]  ? find_next_bit+0xc7/0x130
[  555.825737][ T4817]  pcpu_alloc+0xd5b/0x1380
[  555.840838][ T4817]  ? pcpu_alloc_area+0x820/0x820
[  555.845998][ T4817]  __alloc_percpu_gfp+0x28/0x30
[  555.850891][ T4817]  array_map_alloc+0x698/0x7d0
[  555.855696][ T4817]  ? array_of_map_free+0x50/0x50
[  555.860667][ T4817]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  555.867099][ T4817]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  555.867119][ T4817]  ? array_of_map_free+0x50/0x50
[  555.867136][ T4817]  __do_sys_bpf+0x478/0x3610
[  555.867161][ T4817]  ? bpf_prog_load+0x1960/0x1960
[  555.887952][ T4817]  ? __kasan_check_write+0x14/0x20
[  555.893087][ T4817]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  555.898644][ T4817]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  555.898662][ T4817]  ? wait_for_completion+0x440/0x440
[  555.898686][ T4817]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  555.898715][ T4817]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  555.921900][ T4817]  ? do_syscall_64+0x26/0x790
[  555.926597][ T4817]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  555.932682][ T4817]  ? do_syscall_64+0x26/0x790
[  555.934908][ T4827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  555.937378][ T4817]  __x64_sys_bpf+0x73/0xb0
[  555.937397][ T4817]  do_syscall_64+0xfa/0x790
[  555.937420][ T4817]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  555.961745][ T4817] RIP: 0033:0x45a919
[  555.965822][ T4817] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  555.985946][ T4817] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
14:20:06 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1bc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  555.985962][ T4817] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  555.985971][ T4817] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  555.985979][ T4817] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  555.985986][ T4817] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  555.985993][ T4817] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:07 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:07 executing program 2 (fault-call:0 fault-nth:12):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:07 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:07 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000640ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  556.220701][ T4827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:07 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:07 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000740ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:07 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:07 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x9effffff00000000)

14:20:07 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  556.518305][ T4864] FAULT_INJECTION: forcing a failure.
[  556.518305][ T4864] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  556.562034][ T4864] CPU: 1 PID: 4864 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  556.571094][ T4864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  556.581523][ T4864] Call Trace:
[  556.585298][ T4864]  dump_stack+0x197/0x210
[  556.589751][ T4864]  should_fail.cold+0xa/0x15
[  556.594478][ T4864]  ? fault_create_debugfs_attr+0x180/0x180
[  556.600331][ T4864]  ? ___might_sleep+0x163/0x2c0
[  556.600361][ T4864]  should_fail_alloc_page+0x50/0x60
[  556.600376][ T4864]  __alloc_pages_nodemask+0x1a1/0x910
[  556.600406][ T4864]  ? __alloc_pages_slowpath+0x2920/0x2920
[  556.610552][ T4864]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  556.610569][ T4864]  ? find_next_bit+0x107/0x130
[  556.610592][ T4864]  pcpu_populate_chunk+0xf8/0x940
[  556.610604][ T4864]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  556.610615][ T4864]  ? find_next_bit+0xc7/0x130
[  556.610638][ T4864]  pcpu_alloc+0xd5b/0x1380
[  556.610661][ T4864]  ? pcpu_alloc_area+0x820/0x820
14:20:07 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  556.610752][ T4864]  __alloc_percpu_gfp+0x28/0x30
[  556.624687][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  556.629515][ T4864]  array_map_alloc+0x698/0x7d0
[  556.629536][ T4864]  ? array_of_map_free+0x50/0x50
[  556.629553][ T4864]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  556.629567][ T4864]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  556.629582][ T4864]  ? array_of_map_free+0x50/0x50
[  556.629597][ T4864]  __do_sys_bpf+0x478/0x3610
[  556.629616][ T4864]  ? bpf_prog_load+0x1960/0x1960
14:20:07 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1dc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  556.629629][ T4864]  ? __kasan_check_write+0x14/0x20
[  556.629643][ T4864]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  556.629665][ T4864]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  556.726042][ T4864]  ? wait_for_completion+0x440/0x440
[  556.731493][ T4864]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  556.739908][ T4864]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  556.745510][ T4864]  ? do_syscall_64+0x26/0x790
[  556.750332][ T4864]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  556.757171][ T4864]  ? do_syscall_64+0x26/0x790
14:20:07 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1e000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  556.762509][ T4864]  __x64_sys_bpf+0x73/0xb0
[  556.767038][ T4864]  do_syscall_64+0xfa/0x790
[  556.771565][ T4864]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  556.777530][ T4864] RIP: 0033:0x45a919
[  556.781450][ T4864] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  556.801977][ T4864] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
14:20:07 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600560840ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  556.810503][ T4864] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  556.818613][ T4864] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  556.818628][ T4864] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  556.835347][ T4864] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  556.843340][ T4864] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:07 executing program 2 (fault-call:0 fault-nth:13):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  556.901649][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:07 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1e400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:07 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  557.001688][ T4892] FAULT_INJECTION: forcing a failure.
[  557.001688][ T4892] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  557.027529][ T4892] CPU: 1 PID: 4892 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  557.036301][ T4892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  557.046364][ T4892] Call Trace:
[  557.049711][ T4892]  dump_stack+0x197/0x210
[  557.054294][ T4892]  should_fail.cold+0xa/0x15
[  557.059091][ T4892]  ? fault_create_debugfs_attr+0x180/0x180
[  557.064916][ T4892]  ? ___might_sleep+0x163/0x2c0
[  557.069803][ T4892]  should_fail_alloc_page+0x50/0x60
[  557.075021][ T4892]  __alloc_pages_nodemask+0x1a1/0x910
[  557.080423][ T4892]  ? __alloc_pages_slowpath+0x2920/0x2920
[  557.086193][ T4892]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  557.092667][ T4892]  ? find_next_bit+0x107/0x130
[  557.097471][ T4892]  pcpu_populate_chunk+0xf8/0x940
[  557.102533][ T4892]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  557.108295][ T4892]  ? find_next_bit+0xc7/0x130
[  557.113177][ T4892]  pcpu_alloc+0xd5b/0x1380
[  557.117657][ T4892]  ? pcpu_alloc_area+0x820/0x820
[  557.122626][ T4892]  __alloc_percpu_gfp+0x28/0x30
[  557.127752][ T4892]  array_map_alloc+0x698/0x7d0
[  557.132547][ T4892]  ? array_of_map_free+0x50/0x50
[  557.137507][ T4892]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  557.143760][ T4892]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  557.150015][ T4892]  ? array_of_map_free+0x50/0x50
[  557.154987][ T4892]  __do_sys_bpf+0x478/0x3610
[  557.159621][ T4892]  ? bpf_prog_load+0x1960/0x1960
[  557.164573][ T4892]  ? __kasan_check_write+0x14/0x20
[  557.169868][ T4892]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  557.175437][ T4892]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  557.180738][ T4892]  ? wait_for_completion+0x440/0x440
[  557.186045][ T4892]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  557.192306][ T4892]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  557.197776][ T4892]  ? do_syscall_64+0x26/0x790
[  557.202465][ T4892]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  557.208594][ T4892]  ? do_syscall_64+0x26/0x790
[  557.213318][ T4892]  __x64_sys_bpf+0x73/0xb0
[  557.217769][ T4892]  do_syscall_64+0xfa/0x790
[  557.222296][ T4892]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  557.228202][ T4892] RIP: 0033:0x45a919
[  557.232101][ T4892] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  557.251713][ T4892] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
14:20:08 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000a40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:08 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1fc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:08 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xc3ffffff00000000)

14:20:08 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  557.260139][ T4892] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  557.268123][ T4892] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  557.276117][ T4892] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  557.276127][ T4892] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  557.276135][ T4892] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
[  557.357334][ T4907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:08 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x20000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:08 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:08 executing program 2 (fault-call:0 fault-nth:14):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:08 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000c40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:08 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:08 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x20400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  557.511037][ T4921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:08 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000e40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  557.575634][ T4928] FAULT_INJECTION: forcing a failure.
[  557.575634][ T4928] name fail_page_alloc, interval 1, probability 0, space 0, times 0
14:20:08 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xf0ffffff00000000)

[  557.675294][ T4928] CPU: 1 PID: 4928 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  557.683932][ T4928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  557.693987][ T4928] Call Trace:
[  557.697298][ T4928]  dump_stack+0x197/0x210
[  557.701648][ T4928]  should_fail.cold+0xa/0x15
[  557.706260][ T4928]  ? fault_create_debugfs_attr+0x180/0x180
[  557.712081][ T4928]  ? ___might_sleep+0x163/0x2c0
[  557.716965][ T4928]  should_fail_alloc_page+0x50/0x60
14:20:08 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x21c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  557.722171][ T4928]  __alloc_pages_nodemask+0x1a1/0x910
[  557.727559][ T4928]  ? __alloc_pages_slowpath+0x2920/0x2920
[  557.733300][ T4928]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  557.739554][ T4928]  ? find_next_bit+0x107/0x130
[  557.744332][ T4928]  pcpu_populate_chunk+0xf8/0x940
[  557.749365][ T4928]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  557.755099][ T4928]  ? find_next_bit+0xc7/0x130
[  557.759974][ T4928]  pcpu_alloc+0xd5b/0x1380
[  557.764412][ T4928]  ? pcpu_alloc_area+0x820/0x820
[  557.769382][ T4928]  __alloc_percpu_gfp+0x28/0x30
14:20:08 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x22000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  557.774250][ T4928]  array_map_alloc+0x698/0x7d0
[  557.779036][ T4928]  ? array_of_map_free+0x50/0x50
[  557.783988][ T4928]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  557.790229][ T4928]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  557.796486][ T4928]  ? array_of_map_free+0x50/0x50
[  557.801431][ T4928]  __do_sys_bpf+0x478/0x3610
[  557.806036][ T4928]  ? bpf_prog_load+0x1960/0x1960
[  557.810976][ T4928]  ? __kasan_check_write+0x14/0x20
[  557.816089][ T4928]  ? __mutex_unlock_slowpath+0xf0/0x6a0
14:20:08 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x22400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  557.821642][ T4928]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  557.826946][ T4928]  ? wait_for_completion+0x440/0x440
[  557.832249][ T4928]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  557.838517][ T4928]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  557.843992][ T4928]  ? do_syscall_64+0x26/0x790
[  557.848679][ T4928]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  557.854752][ T4928]  ? do_syscall_64+0x26/0x790
[  557.859457][ T4928]  __x64_sys_bpf+0x73/0xb0
[  557.863892][ T4928]  do_syscall_64+0xfa/0x790
[  557.868413][ T4928]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
14:20:08 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x23c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  557.874321][ T4928] RIP: 0033:0x45a919
[  557.878237][ T4928] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  557.897848][ T4928] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  557.906269][ T4928] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  557.914246][ T4928] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  557.922390][ T4928] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  557.930385][ T4928] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  557.938374][ T4928] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:08 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x24000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:09 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  558.075984][ T4961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:09 executing program 2 (fault-call:0 fault-nth:15):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:09 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:09 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000f40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:09 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x24400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  558.181468][ T4966] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:09 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:09 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xfcffffff00000000)

14:20:09 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600002040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  558.344060][ T4981] FAULT_INJECTION: forcing a failure.
[  558.344060][ T4981] name fail_page_alloc, interval 1, probability 0, space 0, times 0
14:20:09 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x25c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  558.420703][ T4981] CPU: 1 PID: 4981 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  558.429333][ T4981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  558.439400][ T4981] Call Trace:
[  558.442701][ T4981]  dump_stack+0x197/0x210
[  558.447048][ T4981]  should_fail.cold+0xa/0x15
[  558.451659][ T4981]  ? fault_create_debugfs_attr+0x180/0x180
[  558.457473][ T4981]  ? ___might_sleep+0x163/0x2c0
[  558.462349][ T4981]  should_fail_alloc_page+0x50/0x60
[  558.467553][ T4981]  __alloc_pages_nodemask+0x1a1/0x910
[  558.472937][ T4981]  ? __alloc_pages_slowpath+0x2920/0x2920
[  558.478674][ T4981]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  558.484918][ T4981]  ? find_next_bit+0x107/0x130
[  558.489691][ T4981]  pcpu_populate_chunk+0xf8/0x940
[  558.494719][ T4981]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  558.500442][ T4981]  ? find_next_bit+0xc7/0x130
[  558.505135][ T4981]  pcpu_alloc+0xd5b/0x1380
[  558.509571][ T4981]  ? pcpu_alloc_area+0x820/0x820
[  558.514536][ T4981]  __alloc_percpu_gfp+0x28/0x30
[  558.514555][ T4981]  array_map_alloc+0x698/0x7d0
[  558.520913][ T4989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  558.524273][ T4981]  ? array_of_map_free+0x50/0x50
[  558.524298][ T4981]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  558.542709][ T4981]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  558.548947][ T4981]  ? array_of_map_free+0x50/0x50
[  558.548964][ T4981]  __do_sys_bpf+0x478/0x3610
[  558.548985][ T4981]  ? bpf_prog_load+0x1960/0x1960
[  558.563404][ T4981]  ? __kasan_check_write+0x14/0x20
[  558.568522][ T4981]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  558.574076][ T4981]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  558.579386][ T4981]  ? wait_for_completion+0x440/0x440
[  558.584688][ T4981]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  558.590950][ T4981]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  558.596410][ T4981]  ? do_syscall_64+0x26/0x790
[  558.601092][ T4981]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  558.607158][ T4981]  ? do_syscall_64+0x26/0x790
[  558.611848][ T4981]  __x64_sys_bpf+0x73/0xb0
[  558.616277][ T4981]  do_syscall_64+0xfa/0x790
14:20:09 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x26000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  558.620790][ T4981]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  558.626685][ T4981] RIP: 0033:0x45a919
[  558.630583][ T4981] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  558.650189][ T4981] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  558.658606][ T4981] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
14:20:09 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:09 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x26400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  558.666578][ T4981] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  558.674562][ T4981] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  558.682562][ T4981] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  558.690536][ T4981] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:09 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x27c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  558.742189][ T4988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:09 executing program 2 (fault-call:0 fault-nth:16):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:09 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600003f40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:09 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:09 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffff7f00000000)

14:20:09 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x28000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  558.985102][ T5019] FAULT_INJECTION: forcing a failure.
[  558.985102][ T5019] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  559.036740][ T5019] CPU: 0 PID: 5019 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  559.045384][ T5019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  559.055445][ T5019] Call Trace:
[  559.058745][ T5019]  dump_stack+0x197/0x210
[  559.063071][ T5019]  should_fail.cold+0xa/0x15
[  559.063091][ T5019]  ? fault_create_debugfs_attr+0x180/0x180
[  559.063109][ T5019]  ? ___might_sleep+0x163/0x2c0
[  559.063137][ T5019]  should_fail_alloc_page+0x50/0x60
[  559.063148][ T5019]  __alloc_pages_nodemask+0x1a1/0x910
[  559.063167][ T5019]  ? __alloc_pages_slowpath+0x2920/0x2920
[  559.094742][ T5019]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  559.101120][ T5019]  ? find_next_bit+0x107/0x130
[  559.105912][ T5019]  pcpu_populate_chunk+0xf8/0x940
[  559.110942][ T5019]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  559.116666][ T5019]  ? find_next_bit+0xc7/0x130
[  559.121359][ T5019]  pcpu_alloc+0xd5b/0x1380
[  559.125781][ T5019]  ? pcpu_alloc_area+0x820/0x820
[  559.130722][ T5019]  __alloc_percpu_gfp+0x28/0x30
[  559.130739][ T5019]  array_map_alloc+0x698/0x7d0
[  559.130759][ T5019]  ? array_of_map_free+0x50/0x50
[  559.145275][ T5019]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  559.151523][ T5019]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  559.157770][ T5019]  ? array_of_map_free+0x50/0x50
[  559.157789][ T5019]  __do_sys_bpf+0x478/0x3610
[  559.157809][ T5019]  ? bpf_prog_load+0x1960/0x1960
[  559.157828][ T5019]  ? __kasan_check_write+0x14/0x20
[  559.172239][ T5019]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  559.172256][ T5019]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  559.172272][ T5019]  ? wait_for_completion+0x440/0x440
[  559.172294][ T5019]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  559.172328][ T5019]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  559.205136][ T5019]  ? do_syscall_64+0x26/0x790
[  559.209833][ T5019]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  559.215920][ T5019]  ? do_syscall_64+0x26/0x790
[  559.220701][ T5019]  __x64_sys_bpf+0x73/0xb0
[  559.225125][ T5019]  do_syscall_64+0xfa/0x790
[  559.229636][ T5019]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  559.235527][ T5019] RIP: 0033:0x45a919
[  559.239448][ T5019] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  559.259168][ T5019] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  559.267583][ T5019] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  559.275554][ T5019] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
14:20:10 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x28400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:10 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:10 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600004040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:10 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:10 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x29c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  559.283532][ T5019] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  559.291514][ T5019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  559.299490][ T5019] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:10 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2a000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:10 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600004840ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:10 executing program 2 (fault-call:0 fault-nth:17):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:10 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  559.396628][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  559.425974][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:10 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:10 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffffff00000000)

14:20:10 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2a400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  559.577884][ T5061] FAULT_INJECTION: forcing a failure.
[  559.577884][ T5061] name fail_page_alloc, interval 1, probability 0, space 0, times 0
14:20:10 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600004c40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  559.662917][ T5061] CPU: 0 PID: 5061 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  559.671548][ T5061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  559.681610][ T5061] Call Trace:
[  559.684917][ T5061]  dump_stack+0x197/0x210
[  559.689264][ T5061]  should_fail.cold+0xa/0x15
[  559.693869][ T5061]  ? fault_create_debugfs_attr+0x180/0x180
[  559.699683][ T5061]  ? ___might_sleep+0x163/0x2c0
[  559.704553][ T5061]  should_fail_alloc_page+0x50/0x60
[  559.709756][ T5061]  __alloc_pages_nodemask+0x1a1/0x910
[  559.715144][ T5061]  ? __alloc_pages_slowpath+0x2920/0x2920
[  559.720877][ T5061]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  559.727126][ T5061]  ? find_next_bit+0x107/0x130
[  559.731905][ T5061]  pcpu_populate_chunk+0xf8/0x940
[  559.736972][ T5061]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  559.742698][ T5061]  ? find_next_bit+0xc7/0x130
[  559.747392][ T5061]  pcpu_alloc+0xd5b/0x1380
[  559.751827][ T5061]  ? pcpu_alloc_area+0x820/0x820
[  559.756787][ T5061]  __alloc_percpu_gfp+0x28/0x30
14:20:10 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2bc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:10 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2c000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:10 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2c400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  559.761643][ T5061]  array_map_alloc+0x698/0x7d0
[  559.766422][ T5061]  ? array_of_map_free+0x50/0x50
[  559.771367][ T5061]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  559.777612][ T5061]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  559.783858][ T5061]  ? array_of_map_free+0x50/0x50
[  559.788801][ T5061]  __do_sys_bpf+0x478/0x3610
[  559.793424][ T5061]  ? bpf_prog_load+0x1960/0x1960
[  559.798358][ T5061]  ? __kasan_check_write+0x14/0x20
[  559.803474][ T5061]  ? __mutex_unlock_slowpath+0xf0/0x6a0
14:20:10 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2dc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  559.809023][ T5061]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  559.814310][ T5061]  ? wait_for_completion+0x440/0x440
[  559.819611][ T5061]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  559.825879][ T5061]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  559.831340][ T5061]  ? do_syscall_64+0x26/0x790
[  559.836018][ T5061]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  559.842083][ T5061]  ? do_syscall_64+0x26/0x790
[  559.846770][ T5061]  __x64_sys_bpf+0x73/0xb0
[  559.851205][ T5061]  do_syscall_64+0xfa/0x790
[  559.855731][ T5061]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  559.861642][ T5061] RIP: 0033:0x45a919
[  559.865545][ T5061] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  559.885148][ T5061] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  559.893567][ T5061] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  559.893576][ T5061] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
14:20:10 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2e000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  559.893584][ T5061] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  559.893591][ T5061] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  559.893599][ T5061] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
[  559.913073][ T5085] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:10 executing program 2 (fault-call:0 fault-nth:18):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:10 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2e400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:11 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:11 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  560.086592][ T5085] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:11 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffffffa0004000)

14:20:11 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600085640ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  560.201796][ T5099] FAULT_INJECTION: forcing a failure.
[  560.201796][ T5099] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  560.264556][ T5099] CPU: 0 PID: 5099 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  560.273187][ T5099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  560.283247][ T5099] Call Trace:
[  560.286541][ T5099]  dump_stack+0x197/0x210
[  560.290873][ T5099]  should_fail.cold+0xa/0x15
[  560.290892][ T5099]  ? fault_create_debugfs_attr+0x180/0x180
[  560.290909][ T5099]  ? ___might_sleep+0x163/0x2c0
[  560.290946][ T5099]  should_fail_alloc_page+0x50/0x60
14:20:11 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2fc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  560.311343][ T5099]  __alloc_pages_nodemask+0x1a1/0x910
[  560.316731][ T5099]  ? __alloc_pages_slowpath+0x2920/0x2920
[  560.322469][ T5099]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  560.328726][ T5099]  ? find_next_bit+0x107/0x130
[  560.333507][ T5099]  pcpu_populate_chunk+0xf8/0x940
[  560.338637][ T5099]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  560.338658][ T5099]  ? find_next_bit+0xc7/0x130
[  560.349033][ T5099]  pcpu_alloc+0xd5b/0x1380
[  560.353471][ T5099]  ? pcpu_alloc_area+0x820/0x820
[  560.358435][ T5099]  __alloc_percpu_gfp+0x28/0x30
14:20:11 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600655840ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  560.363294][ T5099]  array_map_alloc+0x698/0x7d0
[  560.363318][ T5099]  ? array_of_map_free+0x50/0x50
[  560.372996][ T5099]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  560.379247][ T5099]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  560.385497][ T5099]  ? array_of_map_free+0x50/0x50
[  560.390449][ T5099]  __do_sys_bpf+0x478/0x3610
[  560.395052][ T5099]  ? bpf_prog_load+0x1960/0x1960
[  560.399992][ T5099]  ? __kasan_check_write+0x14/0x20
[  560.400008][ T5099]  ? __mutex_unlock_slowpath+0xf0/0x6a0
14:20:11 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x30000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  560.400034][ T5099]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  560.415920][ T5099]  ? wait_for_completion+0x440/0x440
[  560.415947][ T5099]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  560.415977][ T5099]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  560.432897][ T5099]  ? do_syscall_64+0x26/0x790
[  560.437582][ T5099]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  560.443654][ T5099]  ? do_syscall_64+0x26/0x790
[  560.448346][ T5099]  __x64_sys_bpf+0x73/0xb0
[  560.452771][ T5099]  do_syscall_64+0xfa/0x790
[  560.452794][ T5099]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  560.452806][ T5099] RIP: 0033:0x45a919
[  560.452823][ T5099] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  560.463167][ T5099] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  560.463181][ T5099] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  560.463191][ T5099] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  560.463199][ T5099] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  560.463208][ T5099] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  560.463216][ T5099] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:11 executing program 2 (fault-call:0 fault-nth:19):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:11 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:11 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:11 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x30400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  560.675162][ T5129] FAULT_INJECTION: forcing a failure.
[  560.675162][ T5129] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  560.703022][ T5129] CPU: 1 PID: 5129 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  560.711640][ T5129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  560.721696][ T5129] Call Trace:
[  560.725002][ T5129]  dump_stack+0x197/0x210
[  560.729359][ T5129]  should_fail.cold+0xa/0x15
[  560.733965][ T5129]  ? fault_create_debugfs_attr+0x180/0x180
[  560.739769][ T5129]  ? ___might_sleep+0x163/0x2c0
[  560.739801][ T5129]  should_fail_alloc_page+0x50/0x60
[  560.739815][ T5129]  __alloc_pages_nodemask+0x1a1/0x910
[  560.739838][ T5129]  ? __alloc_pages_slowpath+0x2920/0x2920
[  560.739861][ T5129]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  560.739874][ T5129]  ? find_next_bit+0x107/0x130
14:20:11 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600006040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  560.739894][ T5129]  pcpu_populate_chunk+0xf8/0x940
[  560.749898][ T5129]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  560.749913][ T5129]  ? find_next_bit+0xc7/0x130
[  560.749937][ T5129]  pcpu_alloc+0xd5b/0x1380
[  560.749965][ T5129]  ? pcpu_alloc_area+0x820/0x820
[  560.749993][ T5129]  __alloc_percpu_gfp+0x28/0x30
[  560.750011][ T5129]  array_map_alloc+0x698/0x7d0
[  560.750032][ T5129]  ? array_of_map_free+0x50/0x50
[  560.750057][ T5129]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  560.767325][ T5129]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  560.767345][ T5129]  ? array_of_map_free+0x50/0x50
[  560.767364][ T5129]  __do_sys_bpf+0x478/0x3610
[  560.767386][ T5129]  ? bpf_prog_load+0x1960/0x1960
[  560.777140][ T5129]  ? __kasan_check_write+0x14/0x20
[  560.777156][ T5129]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  560.777173][ T5129]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  560.777188][ T5129]  ? wait_for_completion+0x440/0x440
[  560.777216][ T5129]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  560.792066][ T5129]  ? trace_hardirqs_on_thunk+0x1a/0x1c
14:20:11 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x31c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:11 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffffffa0008000)

[  560.792082][ T5129]  ? do_syscall_64+0x26/0x790
[  560.792097][ T5129]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  560.792114][ T5129]  ? do_syscall_64+0x26/0x790
[  560.801877][ T5129]  __x64_sys_bpf+0x73/0xb0
[  560.801903][ T5129]  do_syscall_64+0xfa/0x790
[  560.801927][ T5129]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  560.801943][ T5129] RIP: 0033:0x45a919
[  560.801958][ T5129] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
14:20:11 executing program 2 (fault-call:0 fault-nth:20):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  560.801965][ T5129] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  560.801978][ T5129] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  560.801987][ T5129] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  560.801993][ T5129] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  560.802001][ T5129] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  560.802009][ T5129] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:11 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:11 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:11 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x32000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  561.068541][ T5151] FAULT_INJECTION: forcing a failure.
[  561.068541][ T5151] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  561.083516][ T5151] CPU: 0 PID: 5151 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  561.092128][ T5151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  561.102194][ T5151] Call Trace:
[  561.105504][ T5151]  dump_stack+0x197/0x210
[  561.109849][ T5151]  should_fail.cold+0xa/0x15
14:20:12 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffffffa000a000)

14:20:12 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x32400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  561.114473][ T5151]  ? fault_create_debugfs_attr+0x180/0x180
[  561.120306][ T5151]  ? ___might_sleep+0x163/0x2c0
[  561.125180][ T5151]  should_fail_alloc_page+0x50/0x60
[  561.130382][ T5151]  __alloc_pages_nodemask+0x1a1/0x910
[  561.135767][ T5151]  ? __alloc_pages_slowpath+0x2920/0x2920
[  561.141501][ T5151]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  561.147747][ T5151]  ? find_next_bit+0x107/0x130
[  561.152525][ T5151]  pcpu_populate_chunk+0xf8/0x940
[  561.157553][ T5151]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  561.163291][ T5151]  ? find_next_bit+0xc7/0x130
[  561.167984][ T5151]  pcpu_alloc+0xd5b/0x1380
[  561.172420][ T5151]  ? pcpu_alloc_area+0x820/0x820
[  561.177385][ T5151]  __alloc_percpu_gfp+0x28/0x30
[  561.182252][ T5151]  array_map_alloc+0x698/0x7d0
[  561.187029][ T5151]  ? array_of_map_free+0x50/0x50
[  561.191983][ T5151]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  561.198238][ T5151]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  561.204493][ T5151]  ? array_of_map_free+0x50/0x50
[  561.209445][ T5151]  __do_sys_bpf+0x478/0x3610
[  561.214050][ T5151]  ? bpf_prog_load+0x1960/0x1960
14:20:12 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x33c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  561.218996][ T5151]  ? __kasan_check_write+0x14/0x20
[  561.224112][ T5151]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  561.229659][ T5151]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  561.229683][ T5151]  ? wait_for_completion+0x440/0x440
[  561.229709][ T5151]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  561.229738][ T5151]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  561.229756][ T5151]  ? do_syscall_64+0x26/0x790
[  561.246520][ T5151]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  561.246537][ T5151]  ? do_syscall_64+0x26/0x790
[  561.246565][ T5151]  __x64_sys_bpf+0x73/0xb0
[  561.246584][ T5151]  do_syscall_64+0xfa/0x790
[  561.276323][ T5151]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  561.282213][ T5151] RIP: 0033:0x45a919
[  561.282229][ T5151] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  561.282238][ T5151] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
14:20:12 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x34000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:12 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600586540ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  561.282253][ T5151] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  561.282262][ T5151] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  561.282269][ T5151] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  561.282281][ T5151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  561.305764][ T5151] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:12 executing program 2 (fault-call:0 fault-nth:21):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:12 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffffffa0010000)

14:20:12 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:12 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:12 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x34400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:12 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600006840ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  561.505652][ T5180] FAULT_INJECTION: forcing a failure.
[  561.505652][ T5180] name fail_page_alloc, interval 1, probability 0, space 0, times 0
14:20:12 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x35c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  561.547563][ T5180] CPU: 0 PID: 5180 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  561.556196][ T5180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  561.566257][ T5180] Call Trace:
[  561.569561][ T5180]  dump_stack+0x197/0x210
[  561.573905][ T5180]  should_fail.cold+0xa/0x15
[  561.578514][ T5180]  ? fault_create_debugfs_attr+0x180/0x180
[  561.578534][ T5180]  ? ___might_sleep+0x163/0x2c0
[  561.578562][ T5180]  should_fail_alloc_page+0x50/0x60
14:20:12 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xfffffffffffff000)

[  561.578573][ T5180]  __alloc_pages_nodemask+0x1a1/0x910
[  561.578592][ T5180]  ? __alloc_pages_slowpath+0x2920/0x2920
[  561.594421][ T5180]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  561.611701][ T5180]  ? find_next_bit+0x107/0x130
[  561.616495][ T5180]  pcpu_populate_chunk+0xf8/0x940
[  561.621528][ T5180]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  561.627244][ T5180]  ? find_next_bit+0xc7/0x130
[  561.627272][ T5180]  pcpu_alloc+0xd5b/0x1380
[  561.627303][ T5180]  ? pcpu_alloc_area+0x820/0x820
[  561.641317][ T5180]  __alloc_percpu_gfp+0x28/0x30
[  561.646189][ T5180]  array_map_alloc+0x698/0x7d0
[  561.650963][ T5180]  ? array_of_map_free+0x50/0x50
[  561.650985][ T5180]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  561.651004][ T5180]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  561.668391][ T5180]  ? array_of_map_free+0x50/0x50
[  561.668409][ T5180]  __do_sys_bpf+0x478/0x3610
[  561.668432][ T5180]  ? bpf_prog_load+0x1960/0x1960
[  561.668446][ T5180]  ? __kasan_check_write+0x14/0x20
[  561.668466][ T5180]  ? __mutex_unlock_slowpath+0xf0/0x6a0
14:20:12 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x36000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  561.693524][ T5180]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  561.698823][ T5180]  ? wait_for_completion+0x440/0x440
[  561.698849][ T5180]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  561.698883][ T5180]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  561.698895][ T5180]  ? do_syscall_64+0x26/0x790
[  561.698914][ T5180]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  561.726727][ T5180]  ? do_syscall_64+0x26/0x790
[  561.726753][ T5180]  __x64_sys_bpf+0x73/0xb0
[  561.726772][ T5180]  do_syscall_64+0xfa/0x790
[  561.726794][ T5180]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  561.726806][ T5180] RIP: 0033:0x45a919
[  561.726827][ T5180] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  561.740385][ T5180] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  561.769854][ T5180] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  561.769863][ T5180] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
14:20:12 executing program 2 (fault-call:0 fault-nth:22):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  561.769870][ T5180] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  561.769877][ T5180] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  561.769884][ T5180] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:12 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600006c40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:12 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:12 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:12 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
r1 = getpid()
ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80000001)
write$cgroup_pid(r0, &(0x7f0000000080)=r1, 0x12)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)
r3 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = openat$cgroup_ro(r0, &(0x7f0000000c00)='cpu.stat\x00', 0x0, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000c40)={r4})

14:20:12 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x36400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  562.001784][ T5209] FAULT_INJECTION: forcing a failure.
[  562.001784][ T5209] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  562.089340][ T5209] CPU: 1 PID: 5209 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  562.097995][ T5209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  562.109644][ T5209] Call Trace:
[  562.112971][ T5209]  dump_stack+0x197/0x210
[  562.117329][ T5209]  should_fail.cold+0xa/0x15
[  562.121937][ T5209]  ? fault_create_debugfs_attr+0x180/0x180
[  562.127759][ T5209]  ? ___might_sleep+0x163/0x2c0
[  562.132633][ T5209]  should_fail_alloc_page+0x50/0x60
[  562.137844][ T5209]  __alloc_pages_nodemask+0x1a1/0x910
[  562.143228][ T5209]  ? __alloc_pages_slowpath+0x2920/0x2920
[  562.148966][ T5209]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  562.155211][ T5209]  ? find_next_bit+0x107/0x130
[  562.159993][ T5209]  pcpu_populate_chunk+0xf8/0x940
[  562.165028][ T5209]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  562.170749][ T5209]  ? find_next_bit+0xc7/0x130
[  562.175445][ T5209]  pcpu_alloc+0xd5b/0x1380
[  562.179493][ T5227] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  562.179873][ T5209]  ? pcpu_alloc_area+0x820/0x820
[  562.192069][ T5209]  __alloc_percpu_gfp+0x28/0x30
[  562.196923][ T5209]  array_map_alloc+0x698/0x7d0
[  562.201701][ T5209]  ? array_of_map_free+0x50/0x50
[  562.206653][ T5209]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  562.212893][ T5209]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  562.219139][ T5209]  ? array_of_map_free+0x50/0x50
[  562.224086][ T5209]  __do_sys_bpf+0x478/0x3610
[  562.228686][ T5209]  ? bpf_prog_load+0x1960/0x1960
[  562.233680][ T5209]  ? __kasan_check_write+0x14/0x20
[  562.238804][ T5209]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  562.244389][ T5209]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  562.249692][ T5209]  ? wait_for_completion+0x440/0x440
[  562.255023][ T5209]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  562.261413][ T5209]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  562.266893][ T5209]  ? do_syscall_64+0x26/0x790
[  562.271602][ T5209]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  562.277686][ T5209]  ? do_syscall_64+0x26/0x790
[  562.282388][ T5209]  __x64_sys_bpf+0x73/0xb0
14:20:13 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x37c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:13 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x38000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  562.286854][ T5209]  do_syscall_64+0xfa/0x790
[  562.291375][ T5209]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  562.297278][ T5209] RIP: 0033:0x45a919
[  562.301185][ T5209] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  562.320912][ T5209] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  562.329337][ T5209] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
14:20:13 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600007440ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  562.337321][ T5209] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  562.345301][ T5209] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  562.353279][ T5209] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  562.361253][ T5209] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:13 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x38400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:13 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:13 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  562.483727][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:13 executing program 2 (fault-call:0 fault-nth:23):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:13 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600007a40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:13 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x39c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:13 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0x10)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r1, 0x8000000000d}, 0x10)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0)
ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000080))
perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r2, 0x0, r3, 0x0)
perf_event_open$cgroup(&(0x7f0000000100)={0x2e9ef9a012bf923e, 0x70, 0x2, 0x3, 0xd6, 0x8, 0x0, 0xf39a, 0x8020, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x101, 0x80}, 0x8, 0x2, 0xe5, 0x5, 0x0, 0x7, 0x2}, r2, 0x10, 0xffffffffffffffff, 0xa)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4)
close(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  562.776363][ T5259] FAULT_INJECTION: forcing a failure.
[  562.776363][ T5259] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  562.825389][ T5259] CPU: 0 PID: 5259 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  562.834019][ T5259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  562.844071][ T5259] Call Trace:
[  562.847371][ T5259]  dump_stack+0x197/0x210
[  562.851715][ T5259]  should_fail.cold+0xa/0x15
[  562.856317][ T5259]  ? fault_create_debugfs_attr+0x180/0x180
[  562.862142][ T5259]  ? ___might_sleep+0x163/0x2c0
[  562.867015][ T5259]  should_fail_alloc_page+0x50/0x60
[  562.872221][ T5259]  __alloc_pages_nodemask+0x1a1/0x910
[  562.877608][ T5259]  ? __alloc_pages_slowpath+0x2920/0x2920
[  562.883345][ T5259]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  562.889589][ T5259]  ? find_next_bit+0x107/0x130
[  562.894368][ T5259]  pcpu_populate_chunk+0xf8/0x940
[  562.899400][ T5259]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  562.905111][ T5259]  ? find_next_bit+0xc7/0x130
[  562.909782][ T5259]  pcpu_alloc+0xd5b/0x1380
[  562.914190][ T5259]  ? pcpu_alloc_area+0x820/0x820
[  562.919120][ T5259]  __alloc_percpu_gfp+0x28/0x30
[  562.923963][ T5259]  array_map_alloc+0x698/0x7d0
[  562.928712][ T5259]  ? array_of_map_free+0x50/0x50
[  562.933638][ T5259]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  562.939859][ T5259]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  562.946084][ T5259]  ? array_of_map_free+0x50/0x50
[  562.951007][ T5259]  __do_sys_bpf+0x478/0x3610
[  562.955585][ T5259]  ? bpf_prog_load+0x1960/0x1960
[  562.960507][ T5259]  ? __kasan_check_write+0x14/0x20
[  562.965599][ T5259]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  562.971139][ T5259]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  562.976409][ T5259]  ? wait_for_completion+0x440/0x440
[  562.981683][ T5259]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  562.987921][ T5259]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  562.993369][ T5259]  ? do_syscall_64+0x26/0x790
[  562.998031][ T5259]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  563.004080][ T5259]  ? do_syscall_64+0x26/0x790
[  563.008757][ T5259]  __x64_sys_bpf+0x73/0xb0
[  563.013161][ T5259]  do_syscall_64+0xfa/0x790
[  563.017780][ T5259]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  563.023665][ T5259] RIP: 0033:0x45a919
[  563.027552][ T5259] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  563.047142][ T5259] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  563.055539][ T5259] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  563.063493][ T5259] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
14:20:13 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3a000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:13 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600008140ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  563.071450][ T5259] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  563.079414][ T5259] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  563.087385][ T5259] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:14 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:14 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:14 executing program 2 (fault-call:0 fault-nth:24):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:14 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3a400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:14 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000f040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  563.437583][ T5292] FAULT_INJECTION: forcing a failure.
[  563.437583][ T5292] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  563.489290][ T5292] CPU: 1 PID: 5292 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  563.498626][ T5292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  563.508691][ T5292] Call Trace:
[  563.512007][ T5292]  dump_stack+0x197/0x210
[  563.516374][ T5292]  should_fail.cold+0xa/0x15
[  563.520992][ T5292]  ? fault_create_debugfs_attr+0x180/0x180
[  563.526904][ T5292]  ? ___might_sleep+0x163/0x2c0
[  563.531886][ T5292]  should_fail_alloc_page+0x50/0x60
14:20:14 executing program 0:
r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000000000}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700)
recvmsg(r2, &(0x7f0000031540)={&(0x7f0000030040)=@hci={0x1f, <r3=>0x0}, 0x80, &(0x7f0000031400)=[{&(0x7f00000300c0)=""/216, 0xd8}, {&(0x7f00000301c0)=""/4096, 0x1000}, {&(0x7f00000311c0)=""/251, 0xfb}, {&(0x7f00000312c0)=""/55, 0x37}, {&(0x7f0000031300)=""/24, 0x18}, {&(0x7f0000031340)=""/153, 0x99}], 0x6, &(0x7f0000031480)=""/189, 0xbd}, 0x180e0)
r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
openat$cgroup_ro(r4, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020de82ca21121"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0xe, 0x0, &(0x7f0000000000)="4be624e60b8588ae2b8961abc53c", 0x0}, 0x28)
bpf$PROG_LOAD(0x5, &(0x7f0000031600)={0x17, 0x7, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1cf6, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000001340)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000013c0)=""/191, 0x0, 0xa, [], r3, 0x0, r4, 0x8, &(0x7f0000031580)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000315c0)={0x5, 0x7, 0x2, 0x101}, 0x10, 0xffffffffffffffff, r5}, 0x78)
sendmsg$sock(r1, &(0x7f0000000440)={&(0x7f0000000280)=@xdp={0x2c, 0x4, r3, 0x38}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)="6eb22f182abb2f83c02243380ec4788c63b8", 0x12}, {&(0x7f0000000300)="e7d9064a1bbedc9dbe1c93443a6733e6d5be2ee40a57ed81434b1591eb9096f25364b9ad8fd7c41d92971cf6becbbaad2e0209965a53e65edeeb1d9ced540fb3c0b5de99dab03d953943652fcd3156d0349329ba343453324df4718f8beb5b1e42b4", 0x62}], 0x2, &(0x7f00000003c0)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}], 0x18}, 0x20000000)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)
r7 = perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x40, 0x6, 0x40, 0x4b, 0x0, 0x9, 0xfc725102bb0677bc, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x3c1f, 0x400, 0x5, 0x4, 0x29db, 0x35, 0x101}, 0xffffffffffffffff, 0x9, r0, 0x0)
perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x9, 0x9, 0x81, 0x20, 0x0, 0x100000000, 0x4002, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x98f3, 0x0, @perf_config_ext={0x1, 0xb0de}, 0x7427e9ef5d23adee, 0x2, 0x3, 0x8, 0x7, 0x1, 0x6}, 0xffffffffffffffff, 0x4, r7, 0x5)

[  563.537359][ T5292]  __alloc_pages_nodemask+0x1a1/0x910
[  563.542846][ T5292]  ? __alloc_pages_slowpath+0x2920/0x2920
[  563.548594][ T5292]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  563.554953][ T5292]  ? find_next_bit+0x107/0x130
[  563.559743][ T5292]  pcpu_populate_chunk+0xf8/0x940
[  563.564782][ T5292]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  563.571136][ T5292]  ? find_next_bit+0xc7/0x130
[  563.579245][ T5292]  pcpu_alloc+0xd5b/0x1380
[  563.583703][ T5292]  ? pcpu_alloc_area+0x820/0x820
14:20:14 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  563.588677][ T5292]  __alloc_percpu_gfp+0x28/0x30
[  563.593541][ T5292]  array_map_alloc+0x698/0x7d0
[  563.598686][ T5292]  ? array_of_map_free+0x50/0x50
[  563.603651][ T5292]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  563.609910][ T5292]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  563.616179][ T5292]  ? array_of_map_free+0x50/0x50
[  563.621231][ T5292]  __do_sys_bpf+0x478/0x3610
[  563.626118][ T5292]  ? bpf_prog_load+0x1960/0x1960
[  563.631333][ T5292]  ? __kasan_check_write+0x14/0x20
14:20:14 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  563.637075][ T5292]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  563.642647][ T5292]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  563.647968][ T5292]  ? wait_for_completion+0x440/0x440
[  563.653633][ T5292]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  563.660153][ T5292]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  563.666273][ T5292]  ? do_syscall_64+0x26/0x790
[  563.670973][ T5292]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  563.677050][ T5292]  ? do_syscall_64+0x26/0x790
[  563.681746][ T5292]  __x64_sys_bpf+0x73/0xb0
14:20:14 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3bc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  563.686188][ T5292]  do_syscall_64+0xfa/0x790
[  563.690703][ T5292]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  563.696705][ T5292] RIP: 0033:0x45a919
[  563.696727][ T5292] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  563.720215][ T5292] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  563.723923][ T5307] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  563.728726][ T5292] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  563.728735][ T5292] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  563.728742][ T5292] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  563.728749][ T5292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  563.728756][ T5292] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:14 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:14 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140))

14:20:14 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:14 executing program 2 (fault-call:0 fault-nth:25):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:14 executing program 0:
socketpair(0x11, 0x2, 0xf3, &(0x7f0000000100)={<r0=>0xffffffffffffffff})
ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000140))
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040))
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080), 0x4)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)
r3 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
recvmsg$kcm(r3, &(0x7f0000002500)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000280)=""/210, 0xd2}, {&(0x7f0000000380)=""/27, 0x1b}, {&(0x7f00000003c0)=""/8, 0x8}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/32, 0x20}], 0x5, &(0x7f0000001500)=""/4096, 0x1000}, 0x40000102)

14:20:14 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000003ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:15 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140))

14:20:15 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  564.148481][ T5332] FAULT_INJECTION: forcing a failure.
[  564.148481][ T5332] name fail_page_alloc, interval 1, probability 0, space 0, times 0
14:20:15 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  564.221811][ T5332] CPU: 1 PID: 5332 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  564.230591][ T5332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  564.240654][ T5332] Call Trace:
[  564.243966][ T5332]  dump_stack+0x197/0x210
[  564.248322][ T5332]  should_fail.cold+0xa/0x15
[  564.252940][ T5332]  ? fault_create_debugfs_attr+0x180/0x180
[  564.259732][ T5332]  ? ___might_sleep+0x163/0x2c0
[  564.264625][ T5332]  should_fail_alloc_page+0x50/0x60
[  564.269834][ T5332]  __alloc_pages_nodemask+0x1a1/0x910
[  564.269854][ T5332]  ? __alloc_pages_slowpath+0x2920/0x2920
[  564.269877][ T5332]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  564.269891][ T5332]  ? find_next_bit+0x107/0x130
[  564.269912][ T5332]  pcpu_populate_chunk+0xf8/0x940
[  564.269932][ T5332]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  564.297026][ T5332]  ? find_next_bit+0xc7/0x130
[  564.297052][ T5332]  pcpu_alloc+0xd5b/0x1380
[  564.311876][ T5332]  ? pcpu_alloc_area+0x820/0x820
[  564.316849][ T5332]  __alloc_percpu_gfp+0x28/0x30
[  564.321722][ T5332]  array_map_alloc+0x698/0x7d0
[  564.326503][ T5332]  ? array_of_map_free+0x50/0x50
[  564.331456][ T5332]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  564.335822][ T5337] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  564.337702][ T5332]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  564.337719][ T5332]  ? array_of_map_free+0x50/0x50
[  564.337739][ T5332]  __do_sys_bpf+0x478/0x3610
[  564.360743][ T5332]  ? bpf_prog_load+0x1960/0x1960
[  564.365691][ T5332]  ? __kasan_check_write+0x14/0x20
[  564.370806][ T5332]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  564.376366][ T5332]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  564.381658][ T5332]  ? wait_for_completion+0x440/0x440
[  564.386970][ T5332]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  564.393237][ T5332]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  564.398719][ T5332]  ? do_syscall_64+0x26/0x790
[  564.403405][ T5332]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  564.403979][ T5344] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  564.409472][ T5332]  ? do_syscall_64+0x26/0x790
[  564.409496][ T5332]  __x64_sys_bpf+0x73/0xb0
[  564.409513][ T5332]  do_syscall_64+0xfa/0x790
[  564.409534][ T5332]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  564.409546][ T5332] RIP: 0033:0x45a919
[  564.409561][ T5332] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  564.409568][ T5332] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  564.409581][ T5332] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  564.409589][ T5332] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  564.409596][ T5332] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  564.409603][ T5332] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  564.409610][ T5332] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:15 executing program 2 (fault-call:0 fault-nth:26):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  564.519530][ T5351] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  564.583393][ T5357] FAULT_INJECTION: forcing a failure.
[  564.583393][ T5357] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  564.607362][ T5357] CPU: 0 PID: 5357 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  564.615990][ T5357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  564.626037][ T5357] Call Trace:
[  564.629333][ T5357]  dump_stack+0x197/0x210
[  564.633650][ T5357]  should_fail.cold+0xa/0x15
[  564.638228][ T5357]  ? fault_create_debugfs_attr+0x180/0x180
[  564.644019][ T5357]  ? ___might_sleep+0x163/0x2c0
[  564.648889][ T5357]  should_fail_alloc_page+0x50/0x60
[  564.654106][ T5357]  __alloc_pages_nodemask+0x1a1/0x910
[  564.659584][ T5357]  ? __alloc_pages_slowpath+0x2920/0x2920
[  564.665306][ T5357]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  564.671536][ T5357]  ? find_next_bit+0x107/0x130
[  564.676299][ T5357]  pcpu_populate_chunk+0xf8/0x940
[  564.681311][ T5357]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  564.687017][ T5357]  ? find_next_bit+0xc7/0x130
[  564.691686][ T5357]  pcpu_alloc+0xd5b/0x1380
[  564.696093][ T5357]  ? pcpu_alloc_area+0x820/0x820
[  564.701022][ T5357]  __alloc_percpu_gfp+0x28/0x30
[  564.705860][ T5357]  array_map_alloc+0x698/0x7d0
[  564.710611][ T5357]  ? array_of_map_free+0x50/0x50
[  564.715532][ T5357]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  564.721753][ T5357]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  564.727980][ T5357]  ? array_of_map_free+0x50/0x50
[  564.732993][ T5357]  __do_sys_bpf+0x478/0x3610
[  564.737569][ T5357]  ? bpf_prog_load+0x1960/0x1960
[  564.742489][ T5357]  ? __kasan_check_write+0x14/0x20
[  564.747582][ T5357]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  564.753555][ T5357]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  564.758822][ T5357]  ? wait_for_completion+0x440/0x440
[  564.764094][ T5357]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  564.770330][ T5357]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  564.775770][ T5357]  ? do_syscall_64+0x26/0x790
[  564.780429][ T5357]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  564.786478][ T5357]  ? do_syscall_64+0x26/0x790
[  564.791140][ T5357]  __x64_sys_bpf+0x73/0xb0
[  564.795538][ T5357]  do_syscall_64+0xfa/0x790
[  564.800025][ T5357]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  564.805896][ T5357] RIP: 0033:0x45a919
[  564.809777][ T5357] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  564.829361][ T5357] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  564.837754][ T5357] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  564.845707][ T5357] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  564.853658][ T5357] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  564.861610][ T5357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  564.869559][ T5357] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:15 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:15 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3dc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:15 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000005ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:15 executing program 2 (fault-call:0 fault-nth:27):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  564.890471][ T5358] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:15 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140))

14:20:15 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0)

14:20:15 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  565.061885][ T5369] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  565.114706][ T5375] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  565.140691][ T5377] FAULT_INJECTION: forcing a failure.
[  565.140691][ T5377] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  565.183417][ T5377] CPU: 1 PID: 5377 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  565.192057][ T5377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  565.194246][ T5382] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  565.202120][ T5377] Call Trace:
[  565.202151][ T5377]  dump_stack+0x197/0x210
[  565.202180][ T5377]  should_fail.cold+0xa/0x15
[  565.202203][ T5377]  ? fault_create_debugfs_attr+0x180/0x180
[  565.202223][ T5377]  ? ___might_sleep+0x163/0x2c0
[  565.202257][ T5377]  should_fail_alloc_page+0x50/0x60
[  565.202271][ T5377]  __alloc_pages_nodemask+0x1a1/0x910
[  565.202294][ T5377]  ? __alloc_pages_slowpath+0x2920/0x2920
[  565.221777][ T5377]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  565.232388][ T5377]  ? find_next_bit+0x107/0x130
[  565.232416][ T5377]  pcpu_populate_chunk+0xf8/0x940
[  565.232431][ T5377]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  565.232443][ T5377]  ? find_next_bit+0xc7/0x130
[  565.232473][ T5377]  pcpu_alloc+0xd5b/0x1380
[  565.232508][ T5377]  ? pcpu_alloc_area+0x820/0x820
[  565.284630][ T5377]  __alloc_percpu_gfp+0x28/0x30
[  565.289486][ T5377]  array_map_alloc+0x698/0x7d0
[  565.294250][ T5377]  ? array_of_map_free+0x50/0x50
[  565.299182][ T5377]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  565.305416][ T5377]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  565.311648][ T5377]  ? array_of_map_free+0x50/0x50
[  565.316576][ T5377]  __do_sys_bpf+0x478/0x3610
[  565.321172][ T5377]  ? bpf_prog_load+0x1960/0x1960
[  565.326124][ T5377]  ? __kasan_check_write+0x14/0x20
[  565.331260][ T5377]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  565.336828][ T5377]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  565.342112][ T5377]  ? wait_for_completion+0x440/0x440
[  565.347410][ T5377]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  565.353673][ T5377]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  565.359130][ T5377]  ? do_syscall_64+0x26/0x790
[  565.363799][ T5377]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  565.369852][ T5377]  ? do_syscall_64+0x26/0x790
[  565.374538][ T5377]  __x64_sys_bpf+0x73/0xb0
[  565.378946][ T5377]  do_syscall_64+0xfa/0x790
[  565.383441][ T5377]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  565.389317][ T5377] RIP: 0033:0x45a919
[  565.393198][ T5377] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  565.412791][ T5377] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  565.421190][ T5377] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
14:20:16 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3e000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:16 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000006ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  565.429149][ T5377] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  565.437106][ T5377] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  565.445067][ T5377] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  565.453024][ T5377] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:16 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:16 executing program 2 (fault-call:0 fault-nth:28):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:16 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3e400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:16 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140))

[  565.650577][ T5393] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  565.712586][ T5403] FAULT_INJECTION: forcing a failure.
[  565.712586][ T5403] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  565.735884][ T5406] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  565.774003][ T5403] CPU: 1 PID: 5403 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  565.782643][ T5403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  565.792705][ T5403] Call Trace:
[  565.796015][ T5403]  dump_stack+0x197/0x210
[  565.800618][ T5403]  should_fail.cold+0xa/0x15
[  565.800639][ T5403]  ? fault_create_debugfs_attr+0x180/0x180
[  565.800655][ T5403]  ? ___might_sleep+0x163/0x2c0
[  565.800679][ T5403]  should_fail_alloc_page+0x50/0x60
[  565.800697][ T5403]  __alloc_pages_nodemask+0x1a1/0x910
[  565.811073][ T5403]  ? __alloc_pages_slowpath+0x2920/0x2920
[  565.811097][ T5403]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  565.811111][ T5403]  ? find_next_bit+0x107/0x130
[  565.811132][ T5403]  pcpu_populate_chunk+0xf8/0x940
[  565.811146][ T5403]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  565.811159][ T5403]  ? find_next_bit+0xc7/0x130
[  565.811181][ T5403]  pcpu_alloc+0xd5b/0x1380
[  565.811204][ T5403]  ? pcpu_alloc_area+0x820/0x820
[  565.811233][ T5403]  __alloc_percpu_gfp+0x28/0x30
[  565.872786][ T5403]  array_map_alloc+0x698/0x7d0
[  565.877565][ T5403]  ? array_of_map_free+0x50/0x50
[  565.882525][ T5403]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  565.888774][ T5403]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  565.895023][ T5403]  ? array_of_map_free+0x50/0x50
[  565.899964][ T5403]  __do_sys_bpf+0x478/0x3610
[  565.899986][ T5403]  ? bpf_prog_load+0x1960/0x1960
[  565.900001][ T5403]  ? __kasan_check_write+0x14/0x20
[  565.900014][ T5403]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  565.900030][ T5403]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  565.900045][ T5403]  ? wait_for_completion+0x440/0x440
[  565.900070][ T5403]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  565.900100][ T5403]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  565.900121][ T5403]  ? do_syscall_64+0x26/0x790
[  565.900136][ T5403]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  565.900150][ T5403]  ? do_syscall_64+0x26/0x790
[  565.900171][ T5403]  __x64_sys_bpf+0x73/0xb0
[  565.900189][ T5403]  do_syscall_64+0xfa/0x790
[  565.900212][ T5403]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
14:20:16 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:16 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x40000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:16 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)
r1 = socket$kcm(0x2b, 0x1, 0x0)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
recvmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000480)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000100)=""/14, 0xe}, {&(0x7f0000000200)=""/204, 0xcc}], 0x2, &(0x7f0000000300)=""/205, 0xcd}, 0x3100)
r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4)
close(r3)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000005c0)=0x80000001)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5)
close(r2)
perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x3, 0x56, 0x9, 0x3, 0x0, 0x101, 0x2000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000140), 0x6}, 0x80, 0x9, 0xa87, 0x0, 0x6, 0x4dbc, 0xe0d9}, 0x0, 0xc, r2, 0x3)

[  565.914812][ T5403] RIP: 0033:0x45a919
[  565.957896][ T5403] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  565.957905][ T5403] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  565.957923][ T5403] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  565.973382][ T5403] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
14:20:16 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000007ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  565.973391][ T5403] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  565.973399][ T5403] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  565.973406][ T5403] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
[  566.061616][ T5416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:17 executing program 2 (fault-call:0 fault-nth:29):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:17 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140))

14:20:17 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x40100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  566.156830][ T5416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:17 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x89, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  566.229651][ T5427] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  566.292171][ T5432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  566.330710][ T5436] FAULT_INJECTION: forcing a failure.
14:20:17 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
close(r1)
r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe68, 0x10, &(0x7f0000000000), 0x1dd}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4)
r5 = perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x8, 0x6, 0x4, 0x7, 0x0, 0x80000000, 0x40, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xa}, 0x10, 0x5, 0x8, 0x6, 0xffffffff, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x4)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  566.330710][ T5436] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  566.372610][ T5436] CPU: 0 PID: 5436 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  566.381229][ T5436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  566.381236][ T5436] Call Trace:
[  566.381262][ T5436]  dump_stack+0x197/0x210
[  566.381285][ T5436]  should_fail.cold+0xa/0x15
[  566.381303][ T5436]  ? fault_create_debugfs_attr+0x180/0x180
[  566.381319][ T5436]  ? ___might_sleep+0x163/0x2c0
[  566.381346][ T5436]  should_fail_alloc_page+0x50/0x60
[  566.381361][ T5436]  __alloc_pages_nodemask+0x1a1/0x910
[  566.381382][ T5436]  ? __alloc_pages_slowpath+0x2920/0x2920
[  566.381405][ T5436]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  566.381418][ T5436]  ? find_next_bit+0x107/0x130
[  566.381446][ T5436]  pcpu_populate_chunk+0xf8/0x940
[  566.446437][ T5436]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  566.452147][ T5436]  ? find_next_bit+0xc7/0x130
[  566.456811][ T5436]  pcpu_alloc+0xd5b/0x1380
[  566.461232][ T5436]  ? pcpu_alloc_area+0x820/0x820
[  566.466167][ T5436]  __alloc_percpu_gfp+0x28/0x30
[  566.471001][ T5436]  array_map_alloc+0x698/0x7d0
[  566.475751][ T5436]  ? array_of_map_free+0x50/0x50
[  566.480673][ T5436]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  566.486891][ T5436]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  566.493127][ T5436]  ? array_of_map_free+0x50/0x50
[  566.498058][ T5436]  __do_sys_bpf+0x478/0x3610
[  566.502632][ T5436]  ? bpf_prog_load+0x1960/0x1960
[  566.507552][ T5436]  ? __kasan_check_write+0x14/0x20
[  566.512645][ T5436]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  566.518171][ T5436]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  566.523438][ T5436]  ? wait_for_completion+0x440/0x440
[  566.528711][ T5436]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  566.534947][ T5436]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  566.540394][ T5436]  ? do_syscall_64+0x26/0x790
[  566.545053][ T5436]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  566.551099][ T5436]  ? do_syscall_64+0x26/0x790
[  566.555763][ T5436]  __x64_sys_bpf+0x73/0xb0
[  566.560167][ T5436]  do_syscall_64+0xfa/0x790
[  566.564654][ T5436]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  566.570527][ T5436] RIP: 0033:0x45a919
[  566.574406][ T5436] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  566.593996][ T5436] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  566.602391][ T5436] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  566.610344][ T5436] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
14:20:17 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000009ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:17 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x40200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  566.618312][ T5436] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  566.626276][ T5436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  566.634228][ T5436] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:17 executing program 2 (fault-call:0 fault-nth:30):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:17 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x8a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:17 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x40300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:17 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140))

[  566.817984][ T5445] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  566.844179][ T5451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  566.903250][ T5455] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  566.957158][ T5462] FAULT_INJECTION: forcing a failure.
[  566.957158][ T5462] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  567.007943][ T5462] CPU: 1 PID: 5462 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  567.016590][ T5462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  567.026649][ T5462] Call Trace:
[  567.029958][ T5462]  dump_stack+0x197/0x210
[  567.034296][ T5462]  should_fail.cold+0xa/0x15
[  567.038900][ T5462]  ? fault_create_debugfs_attr+0x180/0x180
[  567.044715][ T5462]  ? ___might_sleep+0x163/0x2c0
[  567.049595][ T5462]  should_fail_alloc_page+0x50/0x60
[  567.054796][ T5462]  __alloc_pages_nodemask+0x1a1/0x910
[  567.060177][ T5462]  ? __alloc_pages_slowpath+0x2920/0x2920
[  567.060202][ T5462]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  567.060216][ T5462]  ? find_next_bit+0x107/0x130
[  567.060237][ T5462]  pcpu_populate_chunk+0xf8/0x940
[  567.060250][ T5462]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  567.060266][ T5462]  ? find_next_bit+0xc7/0x130
[  567.072194][ T5462]  pcpu_alloc+0xd5b/0x1380
[  567.072221][ T5462]  ? pcpu_alloc_area+0x820/0x820
[  567.072249][ T5462]  __alloc_percpu_gfp+0x28/0x30
[  567.072266][ T5462]  array_map_alloc+0x698/0x7d0
[  567.072287][ T5462]  ? array_of_map_free+0x50/0x50
[  567.072307][ T5462]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  567.072321][ T5462]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  567.072342][ T5462]  ? array_of_map_free+0x50/0x50
[  567.092498][ T5462]  __do_sys_bpf+0x478/0x3610
[  567.092518][ T5462]  ? bpf_prog_load+0x1960/0x1960
[  567.092533][ T5462]  ? __kasan_check_write+0x14/0x20
[  567.092546][ T5462]  ? __mutex_unlock_slowpath+0xf0/0x6a0
14:20:18 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000affffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:18 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c0000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:18 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c0100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  567.092560][ T5462]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  567.092576][ T5462]  ? wait_for_completion+0x440/0x440
[  567.092600][ T5462]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  567.106798][ T5462]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  567.106817][ T5462]  ? do_syscall_64+0x26/0x790
[  567.180943][ T5462]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  567.187023][ T5462]  ? do_syscall_64+0x26/0x790
[  567.191724][ T5462]  __x64_sys_bpf+0x73/0xb0
[  567.196161][ T5462]  do_syscall_64+0xfa/0x790
[  567.200681][ T5462]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  567.206575][ T5462] RIP: 0033:0x45a919
[  567.210476][ T5462] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  567.230083][ T5462] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  567.238505][ T5462] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  567.246483][ T5462] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  567.254462][ T5462] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  567.262446][ T5462] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  567.270604][ T5462] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:18 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c0200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:18 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0xffffffffffffff6a, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x401}, 0x0, 0x80, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x3, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x2e, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x269, 0xe00}, 0x0)

14:20:18 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  567.336778][ T5481] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  567.360995][ T5483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:18 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000bffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:18 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x6000000000000000}, 0x40)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  567.621131][ T5500] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  567.655576][ T5503] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:18 executing program 2 (fault-call:0 fault-nth:31):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:18 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c0300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:18 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0x10)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0)
ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000080))
perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r1, 0x0, r2, 0x0)
r3 = perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0xf8, 0xfa, 0x3, 0x44, 0x0, 0x7, 0x237682f624151dd2, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400, 0x4, @perf_bp={&(0x7f0000000200), 0x2}, 0x100, 0x81, 0x9c, 0xb, 0xf825, 0x1000, 0x5c}, r1, 0x3, 0xffffffffffffffff, 0xc)
mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x1ff)
ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10000)
r4 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:18 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:18 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000cffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:18 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x6000000000000000}, 0x40)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:18 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x200000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:18 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  567.852667][ T5511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  567.877919][ T5521] FAULT_INJECTION: forcing a failure.
[  567.877919][ T5521] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  567.883994][ T5519] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  567.948612][ T5521] CPU: 1 PID: 5521 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  567.957239][ T5521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  567.967303][ T5521] Call Trace:
[  567.970616][ T5521]  dump_stack+0x197/0x210
[  567.975144][ T5521]  should_fail.cold+0xa/0x15
[  567.979758][ T5521]  ? fault_create_debugfs_attr+0x180/0x180
[  567.985578][ T5521]  ? ___might_sleep+0x163/0x2c0
[  567.989108][ T5528] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  567.990450][ T5521]  should_fail_alloc_page+0x50/0x60
[  567.990465][ T5521]  __alloc_pages_nodemask+0x1a1/0x910
[  567.990487][ T5521]  ? __alloc_pages_slowpath+0x2920/0x2920
[  567.990511][ T5521]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  567.990526][ T5521]  ? find_next_bit+0x107/0x130
[  567.990557][ T5521]  pcpu_populate_chunk+0xf8/0x940
[  568.030182][ T5521]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  568.036013][ T5521]  ? find_next_bit+0xc7/0x130
[  568.040716][ T5521]  pcpu_alloc+0xd5b/0x1380
14:20:18 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000dffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  568.045159][ T5521]  ? pcpu_alloc_area+0x820/0x820
[  568.050128][ T5521]  __alloc_percpu_gfp+0x28/0x30
[  568.054990][ T5521]  array_map_alloc+0x698/0x7d0
[  568.059772][ T5521]  ? array_of_map_free+0x50/0x50
[  568.064721][ T5521]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  568.070970][ T5521]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  568.077224][ T5521]  ? array_of_map_free+0x50/0x50
[  568.082165][ T5521]  __do_sys_bpf+0x478/0x3610
[  568.082188][ T5521]  ? bpf_prog_load+0x1960/0x1960
[  568.082203][ T5521]  ? __kasan_check_write+0x14/0x20
[  568.082218][ T5521]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  568.082233][ T5521]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  568.082249][ T5521]  ? wait_for_completion+0x440/0x440
[  568.082276][ T5521]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  568.082309][ T5521]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  568.082323][ T5521]  ? do_syscall_64+0x26/0x790
[  568.082336][ T5521]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  568.082354][ T5521]  ? do_syscall_64+0x26/0x790
[  568.096964][ T5521]  __x64_sys_bpf+0x73/0xb0
[  568.144537][ T5521]  do_syscall_64+0xfa/0x790
[  568.149038][ T5521]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  568.154914][ T5521] RIP: 0033:0x45a919
[  568.158795][ T5521] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  568.178384][ T5521] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  568.186780][ T5521] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
14:20:19 executing program 0:
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)
socket$kcm(0x29, 0xa, 0x0)

[  568.194748][ T5521] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  568.202709][ T5521] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  568.210668][ T5521] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  568.218631][ T5521] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:19 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x200100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:19 executing program 2 (fault-call:0 fault-nth:32):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  568.341484][ T5539] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  568.375247][ T5541] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:19 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x6000000000000000}, 0x40)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:19 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x200200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  568.419481][ T5545] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  568.455768][ T5539] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:19 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x8e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:19 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000effffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  568.492309][ T5549] FAULT_INJECTION: forcing a failure.
[  568.492309][ T5549] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  568.560279][ T5549] CPU: 1 PID: 5549 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  568.569021][ T5549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  568.569033][ T5549] Call Trace:
[  568.582388][ T5549]  dump_stack+0x197/0x210
[  568.586741][ T5549]  should_fail.cold+0xa/0x15
[  568.591349][ T5549]  ? fault_create_debugfs_attr+0x180/0x180
[  568.597166][ T5549]  ? ___might_sleep+0x163/0x2c0
[  568.602052][ T5549]  should_fail_alloc_page+0x50/0x60
[  568.607273][ T5549]  __alloc_pages_nodemask+0x1a1/0x910
[  568.612662][ T5549]  ? __alloc_pages_slowpath+0x2920/0x2920
[  568.612696][ T5549]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  568.624646][ T5549]  ? find_next_bit+0x107/0x130
[  568.629435][ T5549]  pcpu_populate_chunk+0xf8/0x940
[  568.634470][ T5549]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  568.640197][ T5549]  ? find_next_bit+0xc7/0x130
[  568.644887][ T5549]  pcpu_alloc+0xd5b/0x1380
[  568.649319][ T5549]  ? pcpu_alloc_area+0x820/0x820
[  568.654280][ T5549]  __alloc_percpu_gfp+0x28/0x30
[  568.659144][ T5549]  array_map_alloc+0x698/0x7d0
[  568.663914][ T5549]  ? array_of_map_free+0x50/0x50
[  568.668846][ T5549]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  568.675087][ T5549]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  568.681343][ T5549]  ? array_of_map_free+0x50/0x50
[  568.687851][ T5549]  __do_sys_bpf+0x478/0x3610
[  568.692463][ T5549]  ? bpf_prog_load+0x1960/0x1960
[  568.697400][ T5549]  ? __kasan_check_write+0x14/0x20
[  568.702524][ T5549]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  568.708083][ T5549]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  568.713359][ T5549]  ? wait_for_completion+0x440/0x440
[  568.713383][ T5549]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  568.713412][ T5549]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  568.713431][ T5549]  ? do_syscall_64+0x26/0x790
[  568.713444][ T5549]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  568.713458][ T5549]  ? do_syscall_64+0x26/0x790
[  568.713480][ T5549]  __x64_sys_bpf+0x73/0xb0
[  568.713497][ T5549]  do_syscall_64+0xfa/0x790
[  568.713519][ T5549]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
14:20:19 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x200300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:19 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)
socket$kcm(0x29, 0x2, 0x0)

[  568.760639][ T5549] RIP: 0033:0x45a919
[  568.764543][ T5549] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  568.784152][ T5549] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  568.792570][ T5549] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  568.800546][ T5549] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  568.808524][ T5549] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  568.816504][ T5549] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  568.824488][ T5549] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:19 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x240000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  568.870081][ T5570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:19 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x240100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  568.975551][ T5570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:19 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x104, 0x6000000000000000}, 0x40)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:19 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  569.050014][ T5577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:20 executing program 0:
r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)
r2 = getpid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r2, <r3=>r0, 0x0, 0x8, &(0x7f0000000200)='@+/eth1\x00'}, 0x30)
r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
close(r4)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4)
perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0)
r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7)
close(r6)
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x2, 0x6, 0xa8, 0x7f, 0x0, 0x2, 0x8301, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40, 0x5, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x4, 0xb2, 0x5, 0xc5, 0x0, 0xfffe}, r2, 0xffffffffffffffff, r6, 0x1)

14:20:20 executing program 2 (fault-call:0 fault-nth:33):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  569.121124][ T5581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:20 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x240200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:20 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000fffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:20 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:20 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x104, 0x6000000000000000}, 0x40)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  569.295300][ T5594] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  569.302260][ T5593] FAULT_INJECTION: forcing a failure.
[  569.302260][ T5593] name fail_page_alloc, interval 1, probability 0, space 0, times 0
14:20:20 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x240300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  569.404747][ T5593] CPU: 1 PID: 5593 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  569.413387][ T5593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  569.423454][ T5593] Call Trace:
[  569.426764][ T5593]  dump_stack+0x197/0x210
[  569.431113][ T5593]  should_fail.cold+0xa/0x15
[  569.435723][ T5593]  ? fault_create_debugfs_attr+0x180/0x180
[  569.441543][ T5593]  ? ___might_sleep+0x163/0x2c0
[  569.446420][ T5593]  should_fail_alloc_page+0x50/0x60
14:20:20 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c0000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  569.451632][ T5593]  __alloc_pages_nodemask+0x1a1/0x910
[  569.457025][ T5593]  ? __alloc_pages_slowpath+0x2920/0x2920
[  569.462764][ T5593]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  569.469011][ T5593]  ? find_next_bit+0x107/0x130
[  569.473798][ T5593]  pcpu_populate_chunk+0xf8/0x940
[  569.478828][ T5593]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  569.484550][ T5593]  ? find_next_bit+0xc7/0x130
[  569.489250][ T5593]  pcpu_alloc+0xd5b/0x1380
[  569.493687][ T5593]  ? pcpu_alloc_area+0x820/0x820
[  569.498646][ T5593]  __alloc_percpu_gfp+0x28/0x30
[  569.503523][ T5593]  array_map_alloc+0x698/0x7d0
[  569.508324][ T5593]  ? array_of_map_free+0x50/0x50
[  569.513277][ T5593]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  569.519526][ T5593]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  569.525779][ T5593]  ? array_of_map_free+0x50/0x50
[  569.530729][ T5593]  __do_sys_bpf+0x478/0x3610
[  569.535337][ T5593]  ? bpf_prog_load+0x1960/0x1960
[  569.540284][ T5593]  ? __kasan_check_write+0x14/0x20
[  569.545399][ T5593]  ? __mutex_unlock_slowpath+0xf0/0x6a0
14:20:20 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c0100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  569.550947][ T5593]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  569.556242][ T5593]  ? wait_for_completion+0x440/0x440
[  569.561551][ T5593]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  569.561585][ T5593]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  569.561599][ T5593]  ? do_syscall_64+0x26/0x790
[  569.561614][ T5593]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  569.561628][ T5593]  ? do_syscall_64+0x26/0x790
[  569.561650][ T5593]  __x64_sys_bpf+0x73/0xb0
[  569.561673][ T5593]  do_syscall_64+0xfa/0x790
[  569.573595][ T5593]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  569.573607][ T5593] RIP: 0033:0x45a919
[  569.573629][ T5593] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  569.573637][ T5593] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  569.573652][ T5593] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  569.573661][ T5593] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  569.573669][ T5593] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  569.573684][ T5593] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  569.593680][ T5593] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:20 executing program 2 (fault-call:0 fault-nth:34):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:20 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x91, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  569.705272][ T5619] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:20 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x104, 0x6000000000000000}, 0x40)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  569.753110][ T5623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  569.771354][ T5624] FAULT_INJECTION: forcing a failure.
[  569.771354][ T5624] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  569.810440][ T5624] CPU: 0 PID: 5624 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  569.819075][ T5624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  569.829141][ T5624] Call Trace:
[  569.832451][ T5624]  dump_stack+0x197/0x210
[  569.836798][ T5624]  should_fail.cold+0xa/0x15
[  569.841405][ T5624]  ? fault_create_debugfs_attr+0x180/0x180
[  569.847214][ T5624]  ? ___might_sleep+0x163/0x2c0
[  569.847243][ T5624]  should_fail_alloc_page+0x50/0x60
[  569.847260][ T5624]  __alloc_pages_nodemask+0x1a1/0x910
[  569.862652][ T5624]  ? __alloc_pages_slowpath+0x2920/0x2920
[  569.868393][ T5624]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  569.874637][ T5624]  ? find_next_bit+0x107/0x130
[  569.874664][ T5624]  pcpu_populate_chunk+0xf8/0x940
[  569.884596][ T5624]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  569.890321][ T5624]  ? find_next_bit+0xc7/0x130
[  569.890348][ T5624]  pcpu_alloc+0xd5b/0x1380
[  569.890376][ T5624]  ? pcpu_alloc_area+0x820/0x820
[  569.890405][ T5624]  __alloc_percpu_gfp+0x28/0x30
[  569.904570][ T5624]  array_map_alloc+0x698/0x7d0
[  569.904592][ T5624]  ? array_of_map_free+0x50/0x50
[  569.904613][ T5624]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  569.919119][ T5624]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  569.931562][ T5624]  ? array_of_map_free+0x50/0x50
[  569.931580][ T5624]  __do_sys_bpf+0x478/0x3610
[  569.931601][ T5624]  ? bpf_prog_load+0x1960/0x1960
[  569.931616][ T5624]  ? __kasan_check_write+0x14/0x20
[  569.931628][ T5624]  ? __mutex_unlock_slowpath+0xf0/0x6a0
14:20:20 executing program 0:
r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$kcm(0x10, 0x2, 0x0)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x8000, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000140)=""/38)
openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x200)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000200)="af2964f2bd98c39f652cae8c1ee45c2341e43cf98101b77169c7fc547b61583d1f9e7770a7c35b77379438b097a813bf4077e73769d7575223a6e556ca3f4c47f0afd36c4a07bfdd1648b4fbb87cc0de517049c06efa19547d2bcc466e02fb51", &(0x7f0000000280)="52484ec16cf714c0b991628a6034f958b2adc8b2a7f90de5fbe9a88d928abebb2138b904ce3a9f81ebde573fa35344bba8947141f41b9b8e30f5fd1974117f8cee56fc57de16ede9ec327c9b482b2d4d574365889621ca3dccef9ec7a92c329ecae552178c6086b3d28160ccbffedcf7a0885bcb2ec90c3d9ac72c4dd7aa473971046b694fa31aa31d"}, 0x20)

14:20:20 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000011ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:20 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c0200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  569.931646][ T5624]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  569.941169][ T5624]  ? wait_for_completion+0x440/0x440
[  569.941195][ T5624]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  569.941227][ T5624]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  569.941241][ T5624]  ? do_syscall_64+0x26/0x790
[  569.941253][ T5624]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  569.941270][ T5624]  ? do_syscall_64+0x26/0x790
[  569.951323][ T5624]  __x64_sys_bpf+0x73/0xb0
[  569.951343][ T5624]  do_syscall_64+0xfa/0x790
[  569.951362][ T5624]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  569.951380][ T5624] RIP: 0033:0x45a919
[  569.962192][ T5624] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  569.962200][ T5624] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  569.962213][ T5624] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  569.962222][ T5624] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
14:20:20 executing program 2 (fault-call:0 fault-nth:35):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:21 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c0300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  569.962231][ T5624] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  569.962238][ T5624] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  569.962247][ T5624] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
[  570.040251][ T5635] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:21 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x92, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  570.250396][ T5638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  570.283107][ T5653] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  570.294228][ T5648] FAULT_INJECTION: forcing a failure.
[  570.294228][ T5648] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  570.317131][ T5648] CPU: 0 PID: 5648 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  570.325747][ T5648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  570.335814][ T5648] Call Trace:
[  570.339122][ T5648]  dump_stack+0x197/0x210
[  570.343477][ T5648]  should_fail.cold+0xa/0x15
14:20:21 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000012ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  570.348086][ T5648]  ? fault_create_debugfs_attr+0x180/0x180
[  570.353895][ T5648]  ? ___might_sleep+0x163/0x2c0
[  570.358752][ T5648]  should_fail_alloc_page+0x50/0x60
[  570.363955][ T5648]  __alloc_pages_nodemask+0x1a1/0x910
[  570.369344][ T5648]  ? __alloc_pages_slowpath+0x2920/0x2920
[  570.375256][ T5648]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  570.381512][ T5648]  ? find_next_bit+0x107/0x130
[  570.386321][ T5648]  pcpu_populate_chunk+0xf8/0x940
[  570.391358][ T5648]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  570.397068][ T5648]  ? find_next_bit+0xc7/0x130
[  570.401737][ T5648]  pcpu_alloc+0xd5b/0x1380
[  570.406143][ T5648]  ? pcpu_alloc_area+0x820/0x820
[  570.411085][ T5648]  __alloc_percpu_gfp+0x28/0x30
[  570.415934][ T5648]  array_map_alloc+0x698/0x7d0
[  570.420695][ T5648]  ? array_of_map_free+0x50/0x50
[  570.425616][ T5648]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  570.431859][ T5648]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  570.438094][ T5648]  ? array_of_map_free+0x50/0x50
[  570.443027][ T5648]  __do_sys_bpf+0x478/0x3610
[  570.447601][ T5648]  ? bpf_prog_load+0x1960/0x1960
[  570.452520][ T5648]  ? __kasan_check_write+0x14/0x20
[  570.457612][ T5648]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  570.463141][ T5648]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  570.468405][ T5648]  ? wait_for_completion+0x440/0x440
[  570.473688][ T5648]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  570.479929][ T5648]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  570.485368][ T5648]  ? do_syscall_64+0x26/0x790
[  570.490035][ T5648]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  570.496083][ T5648]  ? do_syscall_64+0x26/0x790
[  570.500744][ T5648]  __x64_sys_bpf+0x73/0xb0
[  570.505303][ T5648]  do_syscall_64+0xfa/0x790
[  570.509818][ T5648]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  570.515697][ T5648] RIP: 0033:0x45a919
[  570.519587][ T5648] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
14:20:21 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x400000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  570.544563][ T5648] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  570.552966][ T5648] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  570.560934][ T5648] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  570.568895][ T5648] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  570.576862][ T5648] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  570.584818][ T5648] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:21 executing program 2 (fault-call:0 fault-nth:36):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:21 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:21 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x15, 0x0, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe1000040", 0x0, 0x104, 0x6000000000000000}, 0x40)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  570.708433][ T5631] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  570.730952][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:21 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x345, 0xe00}, 0x2363ad7835104161)

14:20:21 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x4000a0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  570.780794][ T5669] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  570.816083][ T5671] FAULT_INJECTION: forcing a failure.
[  570.816083][ T5671] name fail_page_alloc, interval 1, probability 0, space 0, times 0
14:20:21 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000013ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  570.879480][ T5671] CPU: 1 PID: 5671 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  570.888117][ T5671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  570.898174][ T5671] Call Trace:
[  570.898207][ T5671]  dump_stack+0x197/0x210
[  570.905795][ T5671]  should_fail.cold+0xa/0x15
[  570.910402][ T5671]  ? fault_create_debugfs_attr+0x180/0x180
[  570.916231][ T5671]  ? ___might_sleep+0x163/0x2c0
[  570.921113][ T5671]  should_fail_alloc_page+0x50/0x60
[  570.926307][ T5671]  __alloc_pages_nodemask+0x1a1/0x910
[  570.931686][ T5671]  ? __alloc_pages_slowpath+0x2920/0x2920
[  570.937440][ T5671]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  570.943686][ T5671]  ? find_next_bit+0x107/0x130
[  570.948471][ T5671]  pcpu_populate_chunk+0xf8/0x940
[  570.953500][ T5671]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  570.959213][ T5671]  ? find_next_bit+0xc7/0x130
[  570.959241][ T5671]  pcpu_alloc+0xd5b/0x1380
[  570.959266][ T5671]  ? pcpu_alloc_area+0x820/0x820
[  570.959295][ T5671]  __alloc_percpu_gfp+0x28/0x30
[  570.959312][ T5671]  array_map_alloc+0x698/0x7d0
[  570.959339][ T5671]  ? array_of_map_free+0x50/0x50
[  570.959363][ T5671]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  570.959385][ T5671]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  571.000328][ T5671]  ? array_of_map_free+0x50/0x50
[  571.005281][ T5671]  __do_sys_bpf+0x478/0x3610
[  571.009895][ T5671]  ? bpf_prog_load+0x1960/0x1960
[  571.014848][ T5671]  ? __kasan_check_write+0x14/0x20
[  571.020089][ T5671]  ? __mutex_unlock_slowpath+0xf0/0x6a0
14:20:21 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x400200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  571.025685][ T5671]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  571.030985][ T5671]  ? wait_for_completion+0x440/0x440
[  571.036300][ T5671]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  571.042576][ T5671]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  571.048050][ T5671]  ? do_syscall_64+0x26/0x790
[  571.052740][ T5671]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  571.058814][ T5671]  ? do_syscall_64+0x26/0x790
[  571.063503][ T5671]  __x64_sys_bpf+0x73/0xb0
[  571.067933][ T5671]  do_syscall_64+0xfa/0x790
[  571.072451][ T5671]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  571.078339][ T5671] RIP: 0033:0x45a919
[  571.082241][ T5671] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  571.082249][ T5671] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  571.082262][ T5671] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  571.082269][ T5671] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
14:20:22 executing program 2 (fault-call:0 fault-nth:37):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  571.082277][ T5671] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  571.082284][ T5671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  571.082292][ T5671] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:22 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x400300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:22 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x15, 0x0, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe1000040", 0x0, 0x104, 0x6000000000000000}, 0x40)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:22 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  571.195609][ T5690] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  571.220792][ T5691] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  571.273736][ T5693] FAULT_INJECTION: forcing a failure.
[  571.273736][ T5693] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  571.289652][ T5693] CPU: 0 PID: 5693 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  571.298267][ T5693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  571.308331][ T5693] Call Trace:
[  571.311631][ T5693]  dump_stack+0x197/0x210
[  571.315958][ T5693]  should_fail.cold+0xa/0x15
[  571.320559][ T5693]  ? fault_create_debugfs_attr+0x180/0x180
[  571.326372][ T5693]  ? ___might_sleep+0x163/0x2c0
[  571.331245][ T5693]  should_fail_alloc_page+0x50/0x60
[  571.336452][ T5693]  __alloc_pages_nodemask+0x1a1/0x910
[  571.341842][ T5693]  ? __alloc_pages_slowpath+0x2920/0x2920
[  571.347580][ T5693]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  571.347599][ T5693]  ? find_next_bit+0x107/0x130
[  571.358590][ T5693]  pcpu_populate_chunk+0xf8/0x940
[  571.363620][ T5693]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  571.369347][ T5693]  ? find_next_bit+0xc7/0x130
[  571.369373][ T5693]  pcpu_alloc+0xd5b/0x1380
[  571.369400][ T5693]  ? pcpu_alloc_area+0x820/0x820
[  571.369427][ T5693]  __alloc_percpu_gfp+0x28/0x30
[  571.383430][ T5693]  array_map_alloc+0x698/0x7d0
[  571.383452][ T5693]  ? array_of_map_free+0x50/0x50
[  571.393042][ T5693]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  571.404188][ T5693]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  571.410436][ T5693]  ? array_of_map_free+0x50/0x50
[  571.410454][ T5693]  __do_sys_bpf+0x478/0x3610
[  571.410476][ T5693]  ? bpf_prog_load+0x1960/0x1960
[  571.410491][ T5693]  ? __kasan_check_write+0x14/0x20
[  571.410509][ T5693]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  571.420521][ T5693]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  571.420539][ T5693]  ? wait_for_completion+0x440/0x440
[  571.420568][ T5693]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  571.430588][ T5693]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  571.430604][ T5693]  ? do_syscall_64+0x26/0x790
[  571.430617][ T5693]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  571.430634][ T5693]  ? do_syscall_64+0x26/0x790
14:20:22 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000014ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:22 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x440000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:22 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x440100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  571.452938][ T5693]  __x64_sys_bpf+0x73/0xb0
[  571.452957][ T5693]  do_syscall_64+0xfa/0x790
[  571.452978][ T5693]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  571.463076][ T5693] RIP: 0033:0x45a919
[  571.463093][ T5693] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  571.463102][ T5693] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
14:20:22 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000140))
r1 = socket$kcm(0x10, 0x2, 0x0)
socketpair(0xa, 0x2, 0x3, &(0x7f0000000040)={<r2=>0xffffffffffffffff})
r3 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r3})
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  571.463119][ T5693] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  571.473816][ T5693] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  571.473829][ T5693] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  571.492454][ T5693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  571.492463][ T5693] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
14:20:22 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x95, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:22 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x440200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:22 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x15, 0x0, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe1000040", 0x0, 0x104, 0x6000000000000000}, 0x40)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

[  571.620261][ T5712] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  571.647860][ T5714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:22 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000015ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  571.703012][ T5715] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  571.898060][ T5731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  571.961720][ T5738] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  572.002663][ T5743] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:22 executing program 2 (fault-call:0 fault-nth:38):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:22 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0", 0x0, 0x104, 0x6000000000000000}, 0x40)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:22 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:22 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x440300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:23 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000016ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:23 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)
r1 = socket$kcm(0x29, 0xa, 0x0)
sendmsg$kcm(r1, &(0x7f0000001e00)={&(0x7f0000001800)=@rc={0x1f, {0x1, 0x1, 0x8, 0x7f, 0x7f, 0x80}, 0x1}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001880)="9aee98ce001cd73d33e413a6670667ef9f9922488133272dcf48e0daf79636bbbed301172b0f22255c6df4719887de70605c553330f5eca0a05539a5499a62a53777b490a5992203b135808307e0f2d0f93857d4c11bf2f9a225ddd6b6d5", 0x5e}, {&(0x7f0000001900)="344125d522aa6b62e79ba1d34f9e4d1d356ddc635b9f17fee1331e2bbfacb32fed9039344fb8834ad632dc2a8a79cbc57068024b08f7d1e3bd7b5e17653990d3ba77fe0e497400726859c9449c3a55299c6a86f8e32e34a70702966717edb1a68c", 0x61}, {&(0x7f0000001980)="fcc89f3944ae509ed04f5c1dd314387af5c988adb4fa7f4defdd8409649c17d48955a80137caee828d8392f041af0fbcb5fff9138ec51ba281c5b540fa06e5ceb480f5bfc51e855c6904a5b8ad4595649868df4a8d64a5d0480b932b89ba1cd1", 0x60}, {&(0x7f0000001a00)="89f254c918219796b530f55dcb551e8c9f40632e914eff148dadbecdf59e7f5ae7e2f2c58da933921e04500cd2ae9e97c6c347ed2f833dff7698a1ad6361a2257b1388d1c4fcacb98b5c4d8e0d8ddd13b39b2951c99165de19239014070514be8b6ef9520dbe7772a31bbe680ba37583282ae00d250b946c4ef1705488adf637f55dedb053e1c1dbf6fb09afe6942975f485837c1ed0b68df170ce93516b549385a6b0f6751546280b65fc498a07d263ce8324f4e556809f2e6d98642a3dea93ecd7f8ae7298f36f51b19a808b8d16c33f52a86714b2ab8961288456579b1015c76326c4684356", 0xe7}, {&(0x7f0000001b00)="107f880b931694ec2f8d7e16f0d4549a800dfc68ad9040d4022754c2439008f995a44c5adff3755f7d3f0ae806060b59b6638adfabd11f63e1db0b94598de068749749bccaee31b54f3e640c08cd80b6d25028aaecd17bda6aaff39772dc9999e123e08a8f716e5bed7f68fbb86a8c8d74799e30b23a80a70dc1d9a701c53b6e56c00af4a5b514c41342ed6f64aeea58ab63012da727b8a9ade8ee17dc8ea4a5c632707aa6995dd333a485da88230f3721dfd291ff8c5d8f2757cbbc1dd4c25e4d32eef0825374b8c4dbb621c875159b9e3098428b1c3a005f4e7f5e22460f9670e36d210ecd5167350f13ac29c629c8b0a9caff", 0xf4}, {&(0x7f0000001c00)="981bec034f08d525cbae7c3986d0b71ccafa8ddc55f5fcda831d707c50abcd5a433cce5dce730ea869d2fb", 0x2b}], 0x6, &(0x7f0000001cc0)=[{0x20, 0x102, 0x7f, "692da202e02b404d00cc8e7af747bb68"}, {0x70, 0x113, 0x6, "d0499987e64d424cc9b28ab4503aaba868b1c17ac64c36e89189375edf7f3bf7ff2a9e6554b6b29691721964c32406a1ff916e9b82ea40cebcbc517ae4d69e10d8bb8e73f93b4c5e894e8c97078aa0ec200282b33a657e119fc46dea"}, {0x68, 0x6, 0x3, "299412a022ace5a4f8a13193147f5dc62e6dafa4b22886e1f1e8309b36f75273543703af0ec16d0bd29a2d946c91d303a9d40dc5b4471b0e845a13cb703780eaf9906459032a3f1888f1d4871fc13378973df4"}, {0x10, 0x10f, 0xfffffffd}], 0x108}, 0x61043)

14:20:23 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0", 0x0, 0x104, 0x6000000000000000}, 0x40)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:23 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5c0000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:23 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  572.265407][ T5761] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  572.272649][ T5759] FAULT_INJECTION: forcing a failure.
[  572.272649][ T5759] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  572.323542][ T5763] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  572.349741][ T5759] CPU: 0 PID: 5759 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  572.358372][ T5759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  572.368432][ T5759] Call Trace:
14:20:23 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5c0100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  572.371739][ T5759]  dump_stack+0x197/0x210
[  572.376093][ T5759]  should_fail.cold+0xa/0x15
[  572.380699][ T5759]  ? fault_create_debugfs_attr+0x180/0x180
[  572.386514][ T5759]  ? ___might_sleep+0x163/0x2c0
[  572.391384][ T5759]  should_fail_alloc_page+0x50/0x60
[  572.396588][ T5759]  __alloc_pages_nodemask+0x1a1/0x910
[  572.401968][ T5759]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  572.407532][ T5759]  ? __alloc_pages_slowpath+0x2920/0x2920
[  572.413275][ T5759]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
14:20:23 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5c0200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  572.419530][ T5759]  alloc_pages_current+0x107/0x210
[  572.424647][ T5759]  ? ___might_sleep+0x163/0x2c0
[  572.429511][ T5759]  __vmalloc_node_range+0x4f8/0x810
[  572.434732][ T5759]  __vmalloc+0x44/0x50
[  572.438813][ T5759]  ? pcpu_mem_zalloc+0x8a/0xf0
[  572.443587][ T5759]  pcpu_mem_zalloc+0x8a/0xf0
[  572.448192][ T5759]  pcpu_create_chunk+0x12d/0x7f0
[  572.453132][ T5759]  pcpu_alloc+0x10f3/0x1380
[  572.457651][ T5759]  ? pcpu_alloc_area+0x820/0x820
[  572.462606][ T5759]  __alloc_percpu_gfp+0x28/0x30
[  572.467466][ T5759]  array_map_alloc+0x698/0x7d0
14:20:23 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5c0300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  572.472244][ T5759]  ? array_of_map_free+0x50/0x50
[  572.477201][ T5759]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  572.483442][ T5759]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  572.489692][ T5759]  ? array_of_map_free+0x50/0x50
[  572.494651][ T5759]  __do_sys_bpf+0x478/0x3610
[  572.499249][ T5759]  ? bpf_prog_load+0x1960/0x1960
[  572.504191][ T5759]  ? __kasan_check_write+0x14/0x20
[  572.509301][ T5759]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  572.509710][ T5767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  572.514846][ T5759]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  572.514864][ T5759]  ? wait_for_completion+0x440/0x440
[  572.514891][ T5759]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  572.514922][ T5759]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  572.514942][ T5759]  ? do_syscall_64+0x26/0x790
[  572.549113][ T5759]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  572.555191][ T5759]  ? do_syscall_64+0x26/0x790
[  572.559886][ T5759]  __x64_sys_bpf+0x73/0xb0
[  572.564317][ T5759]  do_syscall_64+0xfa/0x790
[  572.568835][ T5759]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  572.574730][ T5759] RIP: 0033:0x45a919
[  572.578627][ T5759] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  572.598223][ T5759] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  572.606626][ T5759] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  572.606635][ T5759] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  572.606642][ T5759] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  572.606650][ T5759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  572.606657][ T5759] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
[  572.660040][ T5763] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
14:20:23 executing program 2 (fault-call:0 fault-nth:39):
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:23 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000017ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

14:20:23 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x600000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:23 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0", 0x0, 0x104, 0x6000000000000000}, 0x40)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140))

14:20:23 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x98, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

14:20:23 executing program 0:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={<r1=>r0})
recvmsg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000200)=""/244, 0xf4}, {&(0x7f0000000080)=""/47, 0x2f}, {&(0x7f0000000300)=""/189, 0xbd}, {&(0x7f0000000440)=""/252, 0xfc}, {&(0x7f0000000100)=""/125, 0x7d}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/48, 0x30}], 0x7, &(0x7f00000006c0)=""/38, 0x26}, 0x2)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0x10)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, r2, 0x8000000000d}, 0x10)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0)
ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000080))
perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r3, 0x0, r4, 0x0)
perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r4, 0x5)
r5 = openat$cgroup_ro(r4, &(0x7f0000000740)='memory.events\x00', 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000008c0)={r5, &(0x7f0000000780)="1bd5d6075c5316aa5ddccb9018e2787b112f7935e7d0ac298d08589ebea63fbcec2039879813127be5a8a96809f194d1d77e8280ea8cce25ea331fb4fa87a186aba21bb2e48bc2", &(0x7f0000000800)="3def523d752b8a069f7b387ea38b92db2019221550dd4d6ba78cb68bbe0941081f64fb07d9937b94dca7876cf82858c0712af7725bbefe106445561c97766ecd1bd9f29266b03c2b84fb9624046ebe9ebd1d3b6b14fdb939163dff34ff7bce267eabef3d04327a1613aa2d317465f0bb496c1659515ee48a4efe22f0bd16880dded4b0113f173857f86dc678ca0247856af9a2", 0x6}, 0x20)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  572.842256][ T5795] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  572.875709][ T5801] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  572.882827][ T5799] FAULT_INJECTION: forcing a failure.
14:20:23 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x600200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  572.882827][ T5799] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  572.911658][ T5799] CPU: 0 PID: 5799 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  572.920293][ T5799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  572.930360][ T5799] Call Trace:
[  572.933681][ T5799]  dump_stack+0x197/0x210
[  572.938034][ T5799]  should_fail.cold+0xa/0x15
[  572.942634][ T5799]  ? fault_create_debugfs_attr+0x180/0x180
[  572.948440][ T5799]  ? ___might_sleep+0x163/0x2c0
[  572.953309][ T5799]  should_fail_alloc_page+0x50/0x60
[  572.958514][ T5799]  __alloc_pages_nodemask+0x1a1/0x910
[  572.963890][ T5799]  ? find_held_lock+0x35/0x130
[  572.968661][ T5799]  ? __alloc_pages_slowpath+0x2920/0x2920
[  572.974394][ T5799]  ? lock_downgrade+0x920/0x920
[  572.974412][ T5799]  ? rwlock_bug.part.0+0x90/0x90
[  572.974429][ T5799]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  572.974451][ T5799]  alloc_pages_current+0x107/0x210
[  572.974470][ T5799]  __get_free_pages+0xc/0x40
[  572.974488][ T5799]  kasan_populate_vmalloc_pte+0x2f/0x1c0
[  572.984267][ T5799]  apply_to_page_range+0x445/0x700
[  572.984289][ T5799]  ? memset+0x40/0x40
[  572.984314][ T5799]  kasan_populate_vmalloc+0x68/0x90
[  572.984332][ T5799]  pcpu_get_vm_areas+0x3c5f/0x3ee0
[  572.984352][ T5799]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  573.031446][ T5799]  pcpu_create_chunk+0x24e/0x7f0
[  573.036400][ T5799]  pcpu_alloc+0x10f3/0x1380
[  573.040935][ T5799]  ? pcpu_alloc_area+0x820/0x820
[  573.045894][ T5799]  __alloc_percpu_gfp+0x28/0x30
[  573.050760][ T5799]  array_map_alloc+0x698/0x7d0
[  573.055539][ T5799]  ? array_of_map_free+0x50/0x50
[  573.060493][ T5799]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  573.066738][ T5799]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  573.072989][ T5799]  ? array_of_map_free+0x50/0x50
[  573.077936][ T5799]  __do_sys_bpf+0x478/0x3610
[  573.082542][ T5799]  ? bpf_prog_load+0x1960/0x1960
[  573.087490][ T5799]  ? __kasan_check_write+0x14/0x20
14:20:23 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x600300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:24 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x640000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

[  573.092610][ T5799]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  573.098174][ T5799]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  573.103493][ T5799]  ? wait_for_completion+0x440/0x440
[  573.108798][ T5799]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  573.115065][ T5799]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  573.120530][ T5799]  ? do_syscall_64+0x26/0x790
[  573.125210][ T5799]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  573.131281][ T5799]  ? do_syscall_64+0x26/0x790
[  573.135975][ T5799]  __x64_sys_bpf+0x73/0xb0
[  573.140393][ T5799]  do_syscall_64+0xfa/0x790
[  573.144895][ T5799]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  573.150784][ T5799] RIP: 0033:0x45a919
[  573.154685][ T5799] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  573.174414][ T5799] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  573.182837][ T5799] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  573.190817][ T5799] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  573.198793][ T5799] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  573.206767][ T5799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  573.214741][ T5799] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
[  573.224687][ T5799] ==================================================================
[  573.233096][ T5799] BUG: KASAN: vmalloc-out-of-bounds in pcpu_alloc+0x589/0x1380
[  573.240626][ T5799] Write of size 32768 at addr ffffe8ffffa00000 by task syz-executor.2/5799
[  573.249195][ T5799] 
[  573.251619][ T5799] CPU: 0 PID: 5799 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  573.260193][ T5799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  573.270240][ T5799] Call Trace:
[  573.273529][ T5799]  dump_stack+0x197/0x210
[  573.277842][ T5799]  ? pcpu_alloc+0x589/0x1380
[  573.282428][ T5799]  print_address_description.constprop.0.cold+0x5/0x30b
[  573.289367][ T5799]  ? pcpu_alloc+0x589/0x1380
[  573.293940][ T5799]  ? pcpu_alloc+0x589/0x1380
[  573.298524][ T5799]  __kasan_report.cold+0x1b/0x41
[  573.303464][ T5799]  ? pcpu_alloc+0x589/0x1380
[  573.308038][ T5799]  kasan_report+0x12/0x20
[  573.312363][ T5799]  check_memory_region+0x134/0x1a0
[  573.317505][ T5799]  memset+0x24/0x40
[  573.321297][ T5799]  pcpu_alloc+0x589/0x1380
[  573.325704][ T5799]  ? pcpu_alloc_area+0x820/0x820
[  573.330632][ T5799]  __alloc_percpu_gfp+0x28/0x30
[  573.335470][ T5799]  array_map_alloc+0x698/0x7d0
[  573.340220][ T5799]  ? array_of_map_free+0x50/0x50
[  573.345142][ T5799]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  573.351364][ T5799]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  573.357587][ T5799]  ? array_of_map_free+0x50/0x50
[  573.362508][ T5799]  __do_sys_bpf+0x478/0x3610
[  573.367083][ T5799]  ? bpf_prog_load+0x1960/0x1960
[  573.372003][ T5799]  ? __kasan_check_write+0x14/0x20
[  573.377100][ T5799]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  573.382628][ T5799]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  573.387933][ T5799]  ? wait_for_completion+0x440/0x440
[  573.393227][ T5799]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  573.399480][ T5799]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  573.404933][ T5799]  ? do_syscall_64+0x26/0x790
[  573.409683][ T5799]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  573.415828][ T5799]  ? do_syscall_64+0x26/0x790
[  573.420499][ T5799]  __x64_sys_bpf+0x73/0xb0
[  573.424905][ T5799]  do_syscall_64+0xfa/0x790
[  573.429393][ T5799]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  573.435265][ T5799] RIP: 0033:0x45a919
[  573.439145][ T5799] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  573.458740][ T5799] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  573.467146][ T5799] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  573.475124][ T5799] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  573.483079][ T5799] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  573.491034][ T5799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  573.498987][ T5799] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
[  573.506963][ T5799] 
[  573.509280][ T5799] 
[  573.511586][ T5799] Memory state around the buggy address:
[  573.517206][ T5799]  ffffe8ffff9fff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  573.525249][ T5799]  ffffe8ffff9fff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  573.533294][ T5799] >ffffe8ffffa00000: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
[  573.541333][ T5799]                    ^
14:20:24 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x640100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c)

14:20:24 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc)
r0 = socket$kcm(0x2, 0x3, 0x2)
sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0)
recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78)
r5 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000018ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0)

[  573.545390][ T5799]  ffffe8ffffa00080: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
[  573.553432][ T5799]  ffffe8ffffa00100: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
[  573.561471][ T5799] ==================================================================
[  573.569518][ T5799] Disabling lock debugging due to kernel taint
14:20:24 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  573.638917][ T5799] Kernel panic - not syncing: panic_on_warn set ...
[  573.645548][ T5799] CPU: 0 PID: 5799 Comm: syz-executor.2 Tainted: G    B             5.5.0-rc1-syzkaller #0
[  573.655524][ T5799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  573.665576][ T5799] Call Trace:
[  573.668861][ T5799]  dump_stack+0x197/0x210
[  573.673173][ T5799]  panic+0x2e3/0x75c
[  573.677070][ T5799]  ? add_taint.cold+0x16/0x16
[  573.681728][ T5799]  ? pcpu_alloc+0x589/0x1380
[  573.686304][ T5799]  ? preempt_schedule+0x4b/0x60
[  573.691136][ T5799]  ? ___preempt_schedule+0x16/0x18
[  573.696231][ T5799]  ? trace_hardirqs_on+0x5e/0x240
[  573.701235][ T5799]  ? pcpu_alloc+0x589/0x1380
[  573.705804][ T5799]  end_report+0x47/0x4f
[  573.709940][ T5799]  ? pcpu_alloc+0x589/0x1380
[  573.714508][ T5799]  __kasan_report.cold+0xe/0x41
[  573.719340][ T5799]  ? pcpu_alloc+0x589/0x1380
[  573.723923][ T5799]  kasan_report+0x12/0x20
[  573.728317][ T5799]  check_memory_region+0x134/0x1a0
[  573.733404][ T5799]  memset+0x24/0x40
[  573.737194][ T5799]  pcpu_alloc+0x589/0x1380
[  573.741594][ T5799]  ? pcpu_alloc_area+0x820/0x820
[  573.746517][ T5799]  __alloc_percpu_gfp+0x28/0x30
[  573.751347][ T5799]  array_map_alloc+0x698/0x7d0
[  573.756093][ T5799]  ? array_of_map_free+0x50/0x50
[  573.761011][ T5799]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  573.767236][ T5799]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  573.773460][ T5799]  ? array_of_map_free+0x50/0x50
[  573.778388][ T5799]  __do_sys_bpf+0x478/0x3610
[  573.782969][ T5799]  ? bpf_prog_load+0x1960/0x1960
[  573.787885][ T5799]  ? __kasan_check_write+0x14/0x20
[  573.792976][ T5799]  ? __mutex_unlock_slowpath+0xf0/0x6a0
[  573.798506][ T5799]  ? rcu_read_lock_bh_held+0xb0/0xb0
[  573.803771][ T5799]  ? wait_for_completion+0x440/0x440
[  573.809039][ T5799]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  573.815267][ T5799]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  573.820791][ T5799]  ? do_syscall_64+0x26/0x790
[  573.825453][ T5799]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  573.831501][ T5799]  ? do_syscall_64+0x26/0x790
[  573.836163][ T5799]  __x64_sys_bpf+0x73/0xb0
[  573.840560][ T5799]  do_syscall_64+0xfa/0x790
[  573.845043][ T5799]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  573.850915][ T5799] RIP: 0033:0x45a919
[  573.854924][ T5799] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  573.874524][ T5799] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  573.882925][ T5799] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919
[  573.890885][ T5799] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000
[  573.898836][ T5799] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  573.906791][ T5799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4
[  573.914742][ T5799] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003
[  573.924148][ T5799] Kernel Offset: disabled
[  573.928475][ T5799] Rebooting in 86400 seconds..