"", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r7 = socket$inet(0x10, 0x2, 0x0) r8 = dup(r7) sendfile(r8, r6, &(0x7f0000000040)=0x103000, 0x8001) sendmsg$NFNL_MSG_CTHELPER_NEW(r6, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x180400}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x88, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x1}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x3}}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x10001}}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000000}, 0x200048c4) 17:05:33 executing program 1: r0 = msgget$private(0x0, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000140)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x5b3}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24088, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x10, 0x2, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c0000001ddc0598c87df6d1d8213dcf", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB='\x00', @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESOCT=r1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00'], 0xd8, 0x11}, 0x50) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000040)={0xfffffffa, 0x3, 0xfffffff8, 0x101, 0x0, "592c0640821e2374a4f64aaa0ebe9ae934c429"}) msgsnd(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r0, &(0x7f00000001c0)={0x2}, 0x8, 0x0) r4 = msgget$private(0x0, 0x0) msgsnd(r4, &(0x7f00000000c0)={0x2}, 0x8, 0x0) msgsnd(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x3f9, 0x0) msgrcv(r4, &(0x7f0000001200)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"/199], 0xc7, 0x0, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000000)={0xffff78cd, 0x80000001, 0x586d, 0x2000000, 0x9, 0x9}) 17:05:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa4400, 0x0) r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) getdents(r4, &(0x7f0000000080)=""/175, 0xaf) [ 373.317971] team0: Cannot enslave team device to itself 17:05:33 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup(r2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000200)={0xc4}, 0x1) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB='@'], 0x54}}, 0x104) sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400008007000000"], 0x14}}, 0x0) pipe(&(0x7f0000000100)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000000c0)={'wg2\x00'}) splice(r0, 0x0, r2, 0x0, 0x47fe7, 0x0) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) r6 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x8, 0xc8001) ioctl$PPPIOCSCOMPRESS(r6, 0x4010744d) 17:05:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x10, 0x1, 0x1, 0x8, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x748000, 0x0, 0x10020000000, 0x0}, 0x2c) 17:05:33 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r7 = socket$inet(0x10, 0x2, 0x0) r8 = dup(r7) sendfile(r8, r6, &(0x7f0000000040)=0x103000, 0x8001) [ 373.547216] team0: Cannot enslave team device to itself 17:05:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa4400, 0x0) r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:33 executing program 2: ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) clock_getres(0x1, &(0x7f0000000040)) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x38, &(0x7f00000002c0)={&(0x7f0000000000)=@bridge_delneigh={0x28, 0x1c, 0xd03, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0xd0}, [@NDA_LLADDR={0xa, 0x2, @link_local}]}, 0x28}}, 0x0) 17:05:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:33 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_SET_PMK(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="000426bd7000fedbdf257b000000140002012a2e311213fd485857625f324335e7db"], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x1) io_setup(0x83, &(0x7f00000003c0)=0x0) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) r4 = open(&(0x7f00000002c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r4, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x64000) io_submit(r2, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8003f00, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 17:05:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa4400, 0x0) socket$inet(0x10, 0x2, 0x0) sendfile(0xffffffffffffffff, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 373.771822] team0: Cannot enslave team device to itself 17:05:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5, 0xc, 0x1}, @IFLA_MACSEC_WINDOW={0x8}]}}}]}, 0x44}}, 0x0) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000440)="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", 0x1000, 0x3f}], 0x2004008, &(0x7f00000002c0)={[{@umask={'umask', 0x3d, 0x400}}, {@force='force'}], [{@dont_measure='dont_measure'}]}) 17:05:34 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r6 = socket$inet(0x10, 0x2, 0x0) dup(r6) [ 373.925705] team0: Cannot enslave team device to itself 17:05:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=@newtaction={0xb4, 0x30, 0x4, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0xa0, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x40}, 0x4, r3}}]}, {0x4}, {0xc}, {0xc}}}, @m_csum={0x4c, 0x2, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x3}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xb4}}, 0x0) 17:05:34 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x10, 0x2, 0x0) 17:05:34 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r7 = socket$inet(0x10, 0x2, 0x0) r8 = dup(r7) sendfile(r8, r6, &(0x7f0000000040)=0x103000, 0x8001) 17:05:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef4100000", 0x17}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:34 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$rfkill(r0, &(0x7f0000001400)={0xfffffffc, 0x0, 0x2, 0x1}, 0x8) socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) read$usbmon(r3, &(0x7f0000000040)=""/51, 0x33) write$binfmt_elf64(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x76, 0x88, 0x5, 0x4f, 0x3, 0x6, 0x4, 0x4e, 0x40, 0x60, 0xfffffffd, 0xff, 0x38, 0x2, 0x6, 0x6f8, 0x2}, [{0x3, 0x2, 0x1ed7ebfe, 0x3, 0x3ff, 0x6, 0x2, 0x9}], "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", [[], []]}, 0x1278) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x800, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 17:05:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa4400, 0x0) socket$inet(0x10, 0x2, 0x0) sendfile(0xffffffffffffffff, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 374.395678] team0: Cannot enslave team device to itself 17:05:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x20000000000000, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e5558202020202020202020202020202020a308d1e720202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="00000000001c00080000000008007809140b2a3a0802", 0x16, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[@ANYRES16=r0]) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000040)=0x3) 17:05:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef4100000", 0x17}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:34 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') 17:05:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa4400, 0x0) socket$inet(0x10, 0x2, 0x0) sendfile(0xffffffffffffffff, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:34 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x0, 0x21, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) 17:05:34 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount(0x0, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, &(0x7f0000000340)='\\:\x00') setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) [ 374.608442] team0: Cannot enslave team device to itself 17:05:34 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x0, 0x21, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) 17:05:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef4100000", 0x17}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 374.774174] tmpfs: No value for mount option '\:' 17:05:35 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') 17:05:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa4400, 0x0) r5 = dup(0xffffffffffffffff) sendfile(r5, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 374.857604] team0: Cannot enslave team device to itself 17:05:35 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') 17:05:35 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') 17:05:35 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x0, 0x21, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) 17:05:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa4400, 0x0) r5 = dup(0xffffffffffffffff) sendfile(r5, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:35 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write(0xffffffffffffffff, 0x0, 0x0) [ 375.369630] validate_nla: 8 callbacks suppressed [ 375.369640] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:35 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x0, 0x21, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) 17:05:35 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') 17:05:35 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) 17:05:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa4400, 0x0) r5 = dup(0xffffffffffffffff) sendfile(r5, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:35 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) write(0xffffffffffffffff, 0x0, 0x0) [ 375.498013] team0: Cannot enslave team device to itself 17:05:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:35 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x0, 0x21}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x85097, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7ffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x9000000, 0x71, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x4, [0x0, 0x0, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$getown(0xffffffffffffffff, 0x9) getdents64(0xffffffffffffffff, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "4d2e4f0824aa7a5d094bd87759abb9067f9de6613d2ca8b3e2151bb3b569dd7459b38757d161b81108c2963fc90f17e9704b125df4ed7ed2a5a5f136ee7b31df"}, 0x48, 0xfffffffffffffffc) nanosleep(&(0x7f00000002c0), 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r0, 0x0) pwrite64(r0, &(0x7f00000003c0)='m48\vg\v', 0x6, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000040), &(0x7f000000d000)=""/102400, 0x19000, &(0x7f0000000200)={&(0x7f0000000180)={'sha256-ssse3\x00'}, &(0x7f00000001c0)="8d9f984793fece4497d4ad3cd66a", 0xe}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) modify_ldt$write(0x1, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff08060001080006040000aaaaaaaaaabbac523d4d1414aa00296c00000000a39ae668fdf2c7504f4d6aef794f9978678d5534de863bb897682db51fcad5fa9d2f21c89f4b7e21f67ec87b418f5e1feff9bd9ce5064af58ea81018dbb7109794c23d7ff6c4f7a74a"], 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) wait4(r2, &(0x7f0000000140), 0x1000000, &(0x7f0000000300)) 17:05:35 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) 17:05:35 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) 17:05:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 375.740368] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 375.781378] team0: Cannot enslave team device to itself 17:05:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x85097, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7ffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x9000000, 0x71, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x4, [0x0, 0x0, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) fcntl$getown(0xffffffffffffffff, 0x9) getdents64(0xffffffffffffffff, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "4d2e4f0824aa7a5d094bd87759abb9067f9de6613d2ca8b3e2151bb3b569dd7459b38757d161b81108c2963fc90f17e9704b125df4ed7ed2a5a5f136ee7b31df"}, 0x48, 0xfffffffffffffffc) nanosleep(&(0x7f00000002c0), 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r0, 0x0) pwrite64(r0, &(0x7f00000003c0)='m48\vg\v', 0x6, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000040), &(0x7f000000d000)=""/102400, 0x19000, &(0x7f0000000200)={&(0x7f0000000180)={'sha256-ssse3\x00'}, &(0x7f00000001c0)="8d9f984793fece4497d4ad3cd66a", 0xe}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) modify_ldt$write(0x1, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff08060001080006040000aaaaaaaaaabbac523d4d1414aa00296c00000000a39ae668fdf2c7504f4d6aef794f9978678d5534de863bb897682db51fcad5fa9d2f21c89f4b7e21f67ec87b418f5e1feff9bd9ce5064af58ea81018dbb7109794c23d7ff6c4f7a74a"], 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) wait4(r2, &(0x7f0000000140), 0x1000000, &(0x7f0000000300)) 17:05:36 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:36 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) semget(0x2, 0x3, 0x6c7) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000900)='nl80211\x00') sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={0x0, 0x34}, 0x1, 0x0, 0x0, 0x24000800}, 0x0) socket(0x10, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x2, 0x0, 0xfffffffd, 0x0, 0xfffffffd}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) dup(r4) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x1, 0x8001) r5 = signalfd(0xffffffffffffffff, &(0x7f0000000100)={[0x40]}, 0x8) accept4$packet(r5, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 17:05:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000040)=0x103000, 0x8001) [ 376.028720] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 376.052170] team0: Cannot enslave team device to itself 17:05:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a001400000000", 0x29}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:36 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x5) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c000}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="48008000"/20, @ANYRES32, @ANYRESHEX], 0x3}}, 0x1) getpgid(0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadaa, 0x20000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self\x00', 0x100, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r4, 0xc0109428, &(0x7f0000000600)={0x2, 0x20}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) vmsplice(r1, &(0x7f0000000540)=[{&(0x7f0000000100)="ab721b2865245b700bc243185590da34ab0cfa1a46026b08a2f3c52af56af93e92075eede64ba0306c587ce6f4957953a5709e3fce5a05bca20b8ebe60432833e45e357176c1627b9161d30291e586a24137e43ef980680938e756f8675928bd5b1f479f12cc59c9e70416202d0f4668b9fff5c90e6a00d49d8d9a45e777db6cc991d566c5e65f9ca988aa050976c5af63fe6ab6994f73e1dd6a9c7f8a594cf0e2996b27da5ea76ba6", 0xa9}, {&(0x7f0000000300)="991dffb2950439deefe418a406f988360f725fe8927fe1a7e3cdb3dd3ee01c515d06016cad88b1c87b20cd6729aa6b3871819283e1fc6cb3ad47e3fc4b064a30ecb1c42c8525d6e12c3b82cd16b133f71e0989fc88cef0e51b849537a645849e6e47e1a895dcba453b0e9c7332a039f30fa3c08c66cb98ca4167c2541aef7f6a4eff2314b5f3935c1b0319da10d1cb1489dc38c498bc5b0cabaa5512cdcfab8c439802490d7f151494b49ea7d199bdd4c4124542006b23286e77a565073317aa03c87246096dd2d925bda292042c2ae42ef01a3808922f219238f595b2ee37a2f1", 0xe1}, {&(0x7f0000000400)="943796248a310a371d6c54e3d3df037b76372326d44015f1f68631feb2efd6ad92d033ef2efea6e10d4ef526c4322db6cfd9a36865e93c41e4da8f881c61618d56b874f71b3fa1cf22207b44b0129ef39ab6a57804f8c7d0eb7844c3f61da48415eaad41e283b0460944eb3b6a65d9465906d0c1dae25521d6f9830d65cc9bd4af75a62d4773a8f59ef5b19f482e4b1d5c0087dab5", 0x95}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000001780)="ccefeb92ba2ee923bed8f80b1210fe825513e69ac6c62e0f83a5fa83c7705cf6726c32f6a0ec769baa1475fd1a287a88d67068fb64fe725a908f1002f018f2a8e9cc0b49fc0e074d9b94cbf7e7120e101e2b1f90bac76e4a9570846398314c77a826e94667e3f4398089aeb72d1f3e1ba3aeed18b103d941e63a55b032c07846f3e0b2fd3386a24e28116489d2d2f6292c1131ecb31c9071a38ab50cd1be276a4a72a3a8604ba73e49daa44624bbb304769a5221ff58598f63fb2d707ddb72e26f67c1ffda90b253ded897a21086bc5aa381c02769f5cd44a141963960662c83740ad4a46c670a18279c4abb94057c3c603a29e4a7fa5e2248f3d5f4fe4a225f16a3c47efc4bb97442a9700dd12a70456c8ecc6622a659a449b7f440bdfeb154390fe498717e86572345304b6304f6ab69a44aca1fd32af1728876ca4e980f762dc78105d4b20c37f00b7504e44d5ea8141a515844547dd9a57cb7c9f73577fd4437ea90fef7304bc5247fa495f0dea2a4212ea24d3cf07037b3a03c4e20ba993ac08222562ff1c3e9e37b1120b189052d968be0a800a45a4fa7797e7c08bca263a73291d701e8c25dfe585a528efd2606dc87124d4058d3cb04e65b82b05d8f73559a84a946e56707d18e6a1d4190578a8616097fe9dfaff81b769041e2a3029cb0049218cbd3862be492e7a6d1d45ccfe873bbccc57449b0052274051f579f7f6a1784427c0201dc26e2730168cf957fdf8b940e85615e0d46c8b596de230b180d09cd7c9b40fd42b42a7139fb1a11cdaea687c52801c6ff41277abcbed6aada7d49a9c48feccfcccae26cde29b4621bb1f9daca79f52eee0e31106eb0b52b97ffad0c862e783cb29e87cad9f5b8cc102bd1b1572d07b4f1bfa74615f1e7510ed618ce8fc3d89a84acb0bb64c9a9910aa2bbe620c98a8252fae66c29135973d238e088eeb04d3fee1a9f60918a18dbcd8338ec58454b7e33e161f08b9e05a64cef22eef54279d85d7abc137ac0cc003e606d4b888388cba15d82c12a958783383d844990223807c15ca54963380bcf13cd9db7aea83d7611e1f164a5ce3b1fcf7291d4067404be24544c4630b923ce39d28c16dc9c0c66fc0997604f744a3ffc41de6624c0d94037a5e8d93c5338c78dd93473c249e0e13ed9ed8ad7657e8f1ca25213eecf4028624afcbb8038fa36e50362f1a322b135c2a1bee0b60189cb05df30f52683ee37d75f1b023adef522ba6466d0b3e0d3c2f3a6de45c98a49f1dcf5c3432fdd842afa210a0b4a0c9c50f558a037a2b9b54a23fb76fe537340d6598ca790982d007b8dc8fecab988bb6d8e249124dd6c8af3bca6e3969608885d12b81337e4899111a3b286f6e16a40aac87a926f2be6b2b08bfdb60a33355a06c0c082c37b7a4672af1d6ea372b49bb41ac41d2c4a347c87af3bdb215220da6f77465e75b9976a9b756a3b43f2a3f441fc5785df145e48d0c30ab0cff68d499623d456355cc10414378b73b4a1dfccd5c5134b5e50036fd15cad352abbdf55d577916b4d3f96d00bc6d1c0945bacc24e788f5e1fd86319f12e85be02dbd8d87aa1fc88a56da5248d5ca415c048869708aa91733f7b88e2fc7da015b2e05eea0e2fc331e26cf3dd16761e181840e39c17a0837c886b30a4846c219cc7ca21b776ce3e0165c78f8881140568552807d55b88526671098d5bef89bed86c7b6fb4536d3b30185255a83c914470bc8b4fd49988e3696a64eb3e82d04bf99ce7c9bb4e80e04921330381375d3cb81ad3ddc764a97ca6a38d05fc996c958998b6cc286eedfa4c0cdd98746ba24e9c6dac6afba8f2af33b7ba05159d7cd65bc7e2f84a41301e457b218d37a54a7f1d2b8fc38e87f7911fdfb8e58da672ba4d9e4a29620413495cdb80880a312e01f79963c7af69a314481af57c0de1ecb735666296cc91c009646593dd213d467acbeebcfea6124c2d1264427a0c2196f305643593c5934a88f798ff54c819a166795205192577e76436f42c4cd51cef64a8f07ebf73b8baf2966a58ac5907cf69dd1cffc5579d7a312fa48778c54b23d3e61e56b1d3db3bb9488df5f8c5324fa5c1134b71916eb7d30be4f925179ce370893a47d541b18e4c269848e91538a4db5643a8841ab0a72118ecdbe84ea433d33b0c8d14b320f0500c3fd08e808a626a604321713ab6927e1e2978678b301186e4327534c80d6005e717404c16b95003cd3c3223a213bcc28e7161d43dc3a2008a5161eaca4f4779559a59ff573cc4e05dbf53e6de7dc83176a710fd10b96c092349b93d3626b0028902b26017824c28fb280957d8c8e846e878c4dbade547f74ac17c0695cae6a3636f26468f44ac0aa8a74301698ba696e6479b6f2524c7d79134325bef9d0953b1758afc589bedaff8049c400deb4819126ecd719d878c8e6cb8f4d83ff99902d69d4aac0621ef39942fa4edba7d6caff8c315d7f443d36457a272367fc031e9b577d8d73b8ebafb88c91ee4ede1340ad592c9ed6e825a40a2206560fae9efa986df7b636963aa9b296313636f3c7356c216cd2b7d0a483bd7dbb2d5c4a7f2c297707f20a41c74824370824acd50f0ca704c027ecee704499fb506ed7123f405e4c175e20b9a005b1a5e2e284e73cbee1ce2a05699c3d24d79138c7b54cb77153d543f8468b3070877cfb4b4e628d6e3b94407c7fe9458a7efdd21539909e72ec10a06fb81f8646522d9850a8d8c5b06821c55b4ed01fef9a9f3d0a6067cd5037267d0a6a05325be70f4fce1c592b1526da7f297de445323165b9b69d1cef5ac7ea54cefaee302577c28b79bea8c27ac66181856cd9d15f59dc9c36a8105056347f717ddf196aa4cb65dbb97ae672468dde2c4adf32af262eb0689919ca7d4ca752d3e22f43deb385ca2e6bcfd741a1f4d0e5840ae8d3691b97f14e63eaaf6bbe3b70e925eccaf0a4e234c43437c7bfda7909697bc878cfebc8a46c4fc5b9d1763b83518b672c25a8d4839209e19440cf2bfa9c3873f6e3b67a872e2493ec4d82eed7020e0fb2e33909a85c631e64a963fb5bccbb47a39ec3bed037cc2472ebdfaf9901d814e9826e42100c36755cc759f23de43bf24f8eeb684c44f59d505b0a0dc1badf1b1e25cb9fcd9af24cead4caa8265e15f0c5d49082a32320875943b541f080a192a6c4e4c1fb37331ba14de254281fad4f6db4c19f82e4c65d12f8a1c8d5fa79a79a8bd9ce1ca2cf5289becabe2663c01b86d3b81e9b9ab35b7bbd5dd67de1c49e1daea678847967de5c1e639439edba981cb57f0517a25b59776f0bd98ba5f629ec6cac05e6ccf64aa59ee7ef88f03d6313107acc05acc03756531757f68d125778215c7da6f33a5306672a92da5a39b11b2647bf2a833098ec2caec6d23132632da979f7b0be11fbc9587eefb18ee2b2836060e426f4a6e23a9e107bed660e829fc7c5dbe38d1cdb3119e09fd785f05859737dbea0f72e75b5bb0371406eadec07f134de5ac12c325c422924032b471c3ff5b7046772e7a9ce4eba0ea06ce946715d418bcdf185bde584e805be7069e72d15c2b6d734c7c18e8d6e82b3e02f2395bfd269f03bcd8c0d7b2a671414ca9997351b16d88d0a8cb2b0d537b89078f2777de307dca7f3de709297dcfffbc619c05f04602f2186473923f8c85334dbfacd94880a8ec65b1dd43dd09d5ef87fc7894649483c9eed4690ea1e696d68099807de8656758083428dd4313392d5cfc18da6e1c516c0bdb7afadba0e74f9ae086490f0761afa6a823ad10d945aed2a15dc39417b4624a8c1578793ffd8e77bbdb3285295b86b3c6e92150729d5693e87527b907a382342c6aca75573f162fd1c7e02580140aad8c2b684d6fe1d88e294dfbe7bcbfc8f65188fdf310036112b09ff68ff6f50da914c53223a05cb6bb48ce5450c11c38a15f8a9c5348107968553698b57d2c31daa1488e87fac76ffe26eb281281eaee5c92de70788ec21f33fe8bf52d4d8a1cad9f5617d68fb85de813ec707f0962b0d2f4d2225e4985d918e7cdea5110f97523d27951b7810e7f08439af8f340aff45137e167606b697d8901a43630465eb0bf167055b9844dd2d83807bbffd11f138ec0effdbaaaf156763dd70341f763e7e9f19c60341e3fc3f91bacde3a618287643d1f146aa993a41170672784f38483c6f4e603f772ce0064a8ece3df46832889282c1b97d0db6f7b0a6b8aef9476d6276493dd73a2fce3b140842c5c172947143b4ef654bb93f4fec003e59a63c8a1e7b3e60fecef29f18d3be6a605d2663f7bcdbea73ae176bd9ee4454ab10ef9ed06547128a651c06f7eeeed6e73a08d9f1835fdf9c69c00b14dbea6ff75f72efcb281560103b9c17690f6fde76574c4b897498341b8c19686f25029c1893be87b0cb14d21a2ba318b788bb92a16bf8445f23cbb503ae2c01171419e981e92446bcd120f930dd1adb6262375f5e79ecf2f588a417da9350d546200afe6eb7d9c9f5075ca197b8aaaaeb71243c84943e97c4c5c83dbecb9528c82a5f5f45ee24de7394181fd1e40981ba18905ccbc08bc7258300387ea8d484e9ae426d549469f8c5cb1066f2ed1fd376c94e4d9a7400082b1a15f6f7d5bf297c438899433bec6cff038e95fcf9a6965965b8498fd4fc6122dfc2b604ee97da0ad686e6bcf6158190665ef0e1ad7380aa5140bfe5254912d1a701ee77fe567ef4146ce12ef87ab3a2b439d4b68a7748fda9bb98ebb34bf244e3a7f4a12061bd32630ed8ddd5b816ecd5c7ba7e2147751cfc0a57a82a57489db964ea169b3339ae1af236fa743f05fe73acb434a0151be375d6ab01a0881a0fdac838822d0f0e0b4b219a34372ba7cceafa2180d6293f6684f712fef4e2e6f93239728620064c29685fd95d942b90d4fc5ae3a5dfa385ad01d9de8350dd79f1f1aa9e16887bd221c46bf35121ab87b88c886bc0b37602187a2a026a7685a2d4c4cafc01a20277375439726d10a27ea734d02938ebd1eecb27016c4f5b5452b0d0f4c5308623f7bd6fe83098b81d28d07130022d21ceae2489a4b4db25389e242328086dff547b414109efb93c82bb892ad4e92897cc8192fc5722a2919cfbf767a3af206fc9c734fde8154f284d6a7d834496b393bf8a80f0dd6f35f439bfc3b8b03b58959d21636140b56897c937ade4dbff4f22922b288ce1e970f34e20895e43391df4bb39f7cde5ce0a84805332254ae8642e34681d7b1997f17072b51c552f05adaa3e985469110fa6ad7c93a21e1443ae2938cdd4e4faf13545d87ab490a15e81c1d0baa9c6fb5bc7a7979a5b22eaeb7b3163de445923ca6d3e1491105ca4530f2188bc32137888ca34307aba217652a4bc4cfde86b80ce069ba877447f629ee4de04aa191a86475a6439d7e6d8e0c6b93a17ee004dbca3f1147f32abd0a9beab01b6b85c76f6f959451dfe69448a2af57dc2cb348f9ea463b934bdd5af21ccced7c138d52b959a5e8f0e8c0f75fda098d706132ced4767ea3b89603a303959855b7dba5117d79a554b85ca2622a9a1d8dc163772a42135dab1aa9adebfd343eda5a1863f856e10d1fba6f0e4c332f9c3954da8e3a366d1815686d536da19ec08c5db76db1c43e76da9876f8ad40f9d26e52f5b945eb0b93a0df61a5d16f83aded162d6d8c71be575744bd6ee5154d60ea6ddc43070620cfc4fb1a775235b6d087a3f6f2965e357f188e5d18c0a8e35393860ff413926678dad2b29bce3a3fc72bb0876563844de52222c7d639f53186e9863a1abe2f909a827ee3bc981670", 0x1000}, {&(0x7f0000002780)="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", 0x1000}, {&(0x7f0000000240)="4f307b68766024a02386f15f9facbab4bb0f57949c736ff46164d8b6687a78afbd66a9415cc84f0f3a3b004d679a0ceef911c5c2aeb6d007d09771ee122acae26a996665733ba66939a47ddfc6470257a33cfcacbef114860255d9151479e6e26763094dce0c66bc6b72f7dafbabf9c0faf54e34c9", 0x75}, {&(0x7f00000004c0)="eff06bc31dcc418f0b541609d8802e2b1b8d67d1c46d512a3bf13c1161487be8c7e9a233a16c8af1f24ad973ecc597fc92e380cc82a9706050036bb9ff25b3dfca4769be41b5decd690c2468808b2610149a4f5dee226ef4f06ef37fe207283af1764fbfd6e452c79d2aa762eafae1a634f0e546b3a18a", 0x77}, {&(0x7f00000001c0)}], 0x9, 0x4) 17:05:36 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:36 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) dup(r3) [ 376.205810] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 376.242789] team0: Cannot enslave team device to itself 17:05:36 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x7, 0x0, 0x20000000, 0x0, 0xc000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000000), &(0x7f0000000040)) getpid() setgroups(0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x616, 0x0) mbind(&(0x7f00009e5000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x10b400, 0x97) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa4, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @loopback}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8000}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8000}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x21}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000), &(0x7f0000000040)=0x4) dup(0xffffffffffffffff) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x440, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x1) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00009, 0x4, 0x0, 0x2306, 0x10000000002) 17:05:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a001400000000", 0x29}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:36 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) socket$inet6_sctp(0xa, 0x0, 0x84) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x54, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000050700000003c46f99f41514506b", @ANYRES32=0x0, @ANYBLOB="039a0000000001001c0012800900616e000000200c00028006000100000000000a000500040000000000000026001300", @ANYRES32=r1], 0x50}}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$CHAR_RAW_IOOPT(r2, 0x1279, &(0x7f0000000140)) 17:05:36 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)) 17:05:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000040)=0x103000, 0x8001) 17:05:36 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x10, 0x2, 0x0) [ 376.422103] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 376.429617] team0: Cannot enslave team device to itself [ 376.484761] IPVS: ftp: loaded support on port[0] = 21 17:05:36 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)) 17:05:36 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x10, 0x2, 0x0) 17:05:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a001400000000", 0x29}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:36 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)) [ 376.742072] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 376.749692] team0: Cannot enslave team device to itself 17:05:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000040)=0x103000, 0x8001) 17:05:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a001400000000800000", 0x2c}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 376.965779] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 376.999261] team0: Cannot enslave team device to itself [ 377.059122] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 377.071523] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 377.128900] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 377.145267] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 17:05:38 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x7, 0x0, 0x20000000, 0x0, 0xc000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000000), &(0x7f0000000040)) getpid() setgroups(0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x616, 0x0) mbind(&(0x7f00009e5000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x10b400, 0x97) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa4, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @loopback}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8000}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8000}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x21}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000), &(0x7f0000000040)=0x4) dup(0xffffffffffffffff) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x440, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x1) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00009, 0x4, 0x0, 0x2306, 0x10000000002) 17:05:38 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:38 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') 17:05:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a001400000000800000", 0x2c}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:38 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x10, 0x2, 0x0) 17:05:38 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) [ 377.942378] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:38 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x3fa, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x80, 0x54, 0x0, 0x0, 0x41c5, 0x228, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000374000/0x3000)=nil, 0x3000, 0x4, 0x4000010, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000140)={0x800, "ac8d373c67b405afabe4e34677618c9b61702ff6c9299f9d088950029b84758e"}) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) close(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) r5 = socket$inet(0x10, 0x2, 0x0) dup(r0) ppoll(&(0x7f0000000040)=[{r0, 0xa0}, {r2, 0x8408}, {r5, 0x802a}], 0x3, &(0x7f0000000080), &(0x7f00000001c0)={[0x9]}, 0x8) sendmsg$xdp(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000380)="eb46643fd8226314a320b3b5a3c3a5156efa296a1ca9fd2c5ca57ad1452005fd2731c11b56d562ede40b01", 0x2b}, {&(0x7f0000000d80)="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", 0x33f}], 0x2}, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000100), 0x4) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsa\x00', 0x40000, 0x0) ioctl$TCSETXW(r6, 0x5435, &(0x7f0000000240)={0x6, 0x8, [0x8f56, 0x2, 0x4, 0x3, 0x7], 0x20}) socket$inet(0xa, 0x0, 0x0) [ 378.003215] team0: Cannot enslave team device to itself 17:05:38 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a001400000000800000", 0x2c}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 378.180138] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 378.207886] team0: Cannot enslave team device to itself 17:05:38 executing program 2: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x18, r0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x1}, 0x42) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 17:05:38 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) signalfd4(r0, &(0x7f00000002c0)={[0x8000]}, 0x8, 0x80000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:38 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a00140000000080000012", 0x2d}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:38 executing program 1: clone(0x20082804ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x12210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x37e}, 0x234, 0x0, 0x5, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x2001040, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) chdir(&(0x7f0000000400)='./file0/file0/file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:05:38 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:39 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, 0x0}], 0x1, 0x1fe, 0x0, 0x0) r4 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0xc3f6]}, 0x8) ioctl$UI_END_FF_UPLOAD(r4, 0x406855c9, &(0x7f00000000c0)={0x0, 0x7bb, {0x56, 0xff, 0x7, {0x663, 0xfffe}, {0x4, 0x5}, @ramp={0x401, 0x2, {0x4, 0x9, 0x6, 0x9}}}, {0x57, 0xfff, 0xff01, {0x0, 0x6}, {0x9, 0xff7f}, @cond=[{0x69a, 0x0, 0x1ff, 0x5, 0x40, 0x6}, {0xfffb, 0xd9, 0xf3, 0xffff, 0xfff, 0x6a08}]}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup3(r1, r2, 0x0) dup2(0xffffffffffffffff, r3) gettid() 17:05:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) dup(r2) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) [ 378.801274] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 378.814773] team0: Cannot enslave team device to itself 17:05:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:39 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:39 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x90) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='lowerdir=./builu1,uppe']) socket$inet_icmp_raw(0x2, 0x3, 0x1) rmdir(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x300}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='pstore\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32], 0xb4, 0x400}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001f000cff000e4000632177fbac14140e", 0x0, 0x100, 0x60000000, 0x0, 0x0, 0x0}, 0x48) 17:05:39 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x0, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a00140000000080000012", 0x2d}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) dup(r2) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) [ 379.015705] team0: Cannot enslave team device to itself 17:05:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a00140000000080000012", 0x2d}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 379.057839] overlayfs: unrecognized mount option "uppe" or missing value 17:05:39 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x0, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 379.139070] overlayfs: unrecognized mount option "uppe" or missing value [ 379.151364] team0: Cannot enslave team device to itself 17:05:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002abd7000fddbdf25030000000c0004007d0a0000000000000c000200c7000000000000000c000800ff7f00000000000067ec0b1f469800297fde7047b8d1349de8d38782bebc46fa5ed8f014f6e0f428d3eed5fe8e3cde42b59862bd195496266462c282a243d1a5b679a8ae53b39e42a4fc861a51a4c60341d0c98fbdc299ac7918edcb705b3e32f3801bf107899b341ed505f5de28a4370518a7e0f655969e702b6b0e3a"], 0x38}, 0x1, 0x0, 0x0, 0x4000054}, 0x20000000) r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000200)="ccc9ae258afdf4a8c5b5c745aa315276525549db0f020ab870dd156bb110", 0x1e, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20}, 0x10) ftruncate(r1, 0x200004) sendfile(r1, r1, 0x0, 0x80001d00c0d3) 17:05:39 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x0, 0x40100) perf_event_open(0x0, 0x0, 0x10, r0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x800, 0x5}, 0x40, 0xeb0a, 0x47, 0x7, 0x27, 0xed1, 0x3}, 0x0, 0x3, r2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x7a00, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) 17:05:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:05:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) dup(r2) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:39 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x0, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 379.427464] team0: Cannot enslave team device to itself [ 379.452683] batman_adv: batadv0: Adding interface: team0 17:05:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 379.477267] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 379.579023] batman_adv: batadv0: Interface activated: team0 [ 379.597908] team0: Cannot enslave team device to itself [ 379.616300] batman_adv: batadv0: Adding interface: team0 17:05:39 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 379.657534] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:05:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) 17:05:40 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:40 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 379.951863] batman_adv: batadv0: Interface activated: team0 [ 380.098600] batman_adv: batadv0: Interface deactivated: team0 [ 380.109795] batman_adv: batadv0: Removing interface: team0 [ 380.186031] team0: Cannot enslave team device to itself [ 380.206928] batman_adv: batadv0: Adding interface: team0 [ 380.219443] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 380.265747] audit: type=1800 audit(1608829540.454:54): pid=19237 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=16518 res=0 17:05:40 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @private}, 0x2}}, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000100)=0x1, 0x4) r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) ioctl$SOUND_MIXER_READ_RECMASK(r2, 0x80044dfd, &(0x7f00000000c0)) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x1, 0x0) ioctl$VIDIOC_QUERYCTRL(r5, 0xc0445624, &(0x7f0000000180)={0x8001, 0x100, "894da08c18736a6b84d2c23e69a1de86f8923841731a7089616547f21a9b710c", 0x10, 0x1e, 0x8b, 0x800, 0x21}) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xa}, 0x1c) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x7000004, 0x0, 0x0, 0x0, 0x0, 0xfffffff5}, 0xfffffff5}], 0x400000000000085, 0x0) r6 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7f, 0x1) ioctl$KDSETLED(r6, 0x4b32, 0x3) 17:05:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) 17:05:40 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:40 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:40 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0xd4c7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xc400, 0x0) ioctl$SNDCTL_SEQ_RESET(r0, 0x5100) set_mempolicy(0x1, &(0x7f0000000040)=0xfffffffffffffffb, 0x7) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 380.321109] batman_adv: batadv0: Interface activated: team0 17:05:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:05:40 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:40 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 380.456290] IPVS: ftp: loaded support on port[0] = 21 [ 380.482665] validate_nla: 8 callbacks suppressed [ 380.482674] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) 17:05:40 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) [ 380.572500] batman_adv: batadv0: Interface deactivated: team0 [ 380.633450] batman_adv: batadv0: Removing interface: team0 [ 380.674105] team0: Cannot enslave team device to itself [ 380.686553] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 380.714517] batman_adv: batadv0: Adding interface: team0 17:05:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r1, 0x4, 0x101, 0x1000}) setsockopt$inet_dccp_int(r3, 0x21, 0xa, &(0x7f0000000100)=0x200, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)={0x3, 'veth0_to_hsr\x00', {0x2}, 0x7b}) syz_mount_image$gfs2(&(0x7f0000005240)='gfs2\x00', &(0x7f0000005280)='./file0\x00', 0x0, 0x0, &(0x7f00000056c0), 0x0, &(0x7f0000005780)={[{@quota_off='quota=off'}, {@norecovery='norecovery'}]}) 17:05:40 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) [ 380.743896] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) [ 380.883822] batman_adv: batadv0: Interface activated: team0 [ 381.167251] IPVS: ftp: loaded support on port[0] = 21 17:05:41 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x513) write$binfmt_script(r0, &(0x7f0000002300)=ANY=[@ANYBLOB="036ae121202e2f64696c65"], 0xb) close(r0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000001b00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5\xfa\xff\xff\xff\xff\xff\xff\xff\xe2\xe3\x02)s\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x90?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\x00'/453, &(0x7f0000001640)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfTf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac\xff\xff\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xdb\xca\v\xf0\xb0e-\xab\x95\xd1\x84\x88\xa0\xa2d\xfbc+r\xfa\x8d\x9es\xc4\x8d\xd6\x96k\a\x05t\x17\xea'], &(0x7f0000001ac0)=[&(0x7f0000002100)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000840)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a', &(0x7f0000001000)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4\xb5\x05\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x95\x03\xf30\n^\xb1~\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbcT\xf9_\xd4\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\x06\x06\xe8\x80\xef\xdf\x87\xd8S\xcca\xb9\xb4:\x19t\xa2`Li\xe4\xe3\xa6P\xbc\xc6 \xfaoD\xf7TlC:p\xf3\xc1\td\vO\xcc\xcf\x89\xcb\xd7\xca\xfa\x12B\xa5\x87\x7f\xb4Kh^\xcdO\xb8\xd86j\x93A\x95\x00\x8d\x1dX\xf8\x19\xd7\x8f$\xad3l\xdc\f\xed\xb5NP\x1f\f\xfc\x83C\xa8\xbbA\x87\xcfiT]w\x8b\x06>', &(0x7f0000001240)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a', &(0x7f0000000180)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000a40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\x84\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fqfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\x8b\x8b\x97?\x9a\xbe\xcf6\xb6\xde\x8b\x8e\x9f\xbcs%\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac\xe6,\xf9\xec\x84R\xc2\x02\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xbe\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18}\xe3\xcek\xe37\xff\x15\x84\x8d(\xc6\x8c2\x88occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9GJm\xfe\xa4\n\xca\x9eOz\x0f\xf9\xb0\xadd\x9d=f\xf3\xca\'\xa8\x1b\xae\xff\xbe\xf9\xe7\xed34\x1c\xd1\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xf8\xff\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xacW\xc1\xd6\x7f\xa1\xc5\xd6#m\xe9\xd7\xb5\x9b\xdd\x8fl8\xb0\xc8>\xd9=\xf6\xc4\x9e\xc5h&Pu\xc4?\x03\xa5\'d\xcas\xf3\xa5Q\xad\xc6\x82\x8e\xe9\x8b\x94&\xe2\xad\xf2;\x16\xbe-`0\x8d\x957\x8a\xd8\x013\xbf\xaac\xc9oc\xc7s*\xef\x87\x1c\xe0\xf6\x93D\xbb&H\xec4\xae\x1c@WW\x1cf\xaa<\x81\xaa\xa7n\xa3t\xfe~\x19E$Cj\xb2\xb4\xa8$\xaa2\x88.|\xaf\xd9\x1c\x81L\xb0\xf0\x05\x81\x8e\xdc\xba\xcd\xf4\xf0P#ln\x87\xd4t\xa7\x7fy\x02%\xe5[\x1b\xb5/-\x9d\xc1\xc0\xe9\x84\xffWRf\x9b\xae\x18\x14\xf4;>\xdd6\x96\xc8\x1b2]\xa47Z\x8a`\xaa\xf4\x85\x90{\xd0`\x02Z\xa6\xa4\xc6@\xefZ\xdb\x84@\x12(l\xa9!\xd5i\xa3\xe3\x9d1\xfa\xcb\r\xc4\xc5\xb7\x90\x1al\xdd\x9f4\x94\xe4[\xb6|\xf0\a\xdb^w\xe0\x88J\xd3\x10$\xec\x8e\x99y2\x9fVL\xd3z\xbf\xb4\x17@\xf7\xa9\xf0\xc2wqN\xa8\\\x9e\xbb\xa3\xbe\xa5cY\xfcd\xbbZdW\x1e\xfc\x98\x1bV\x8fA.\xda\xc37h2q\xc0rj\xe8p\xa2\v\xf4\x00Q\xb8\r\xc6\xea>\xbfyr\xf7\r\n?') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r2, 0x300, 0x70bd2c, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x48014) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(r3, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9(\xee\x8aG\xdd2') bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x7, &(0x7f0000000180)=ANY=[@ANYRES64, @ANYRES32=r3, @ANYBLOB="95009d00"/16], &(0x7f00000000c0)='GPL\x00', 0x0, 0x50, &(0x7f0000000440)=""/80, 0x41000, 0x2, [], 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x7, 0x0, 0x7}, 0x10, 0xffffffffffffffff, r3}, 0x78) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000bb40)={0xc, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f00000001c0)='syzkaller\x00', 0x2aa6, 0x28, &(0x7f0000000200)=""/40, 0x41100, 0x5, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x9, 0x3, 0xfffffc01}, 0x10}, 0x78) 17:05:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 17:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 17:05:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 17:05:41 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)) [ 381.299995] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 381.337953] batman_adv: batadv0: Interface deactivated: team0 17:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) [ 381.386799] batman_adv: batadv0: Removing interface: team0 [ 381.425960] team0: Cannot enslave team device to itself 17:05:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x101012, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x8000, @dev={0xac, 0x14, 0x14, 0x29}}, 0x8) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000002c0)=0x4, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x6) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x12) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, &(0x7f00000000c0)={{0x0, @name="0000010000000000000000000000000000000000009800"}, 0x8, 0x0, 0x2}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='personality\x00') setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0xe563, 0x4) 17:05:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 381.465558] device wlan1 entered promiscuous mode [ 381.477800] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:41 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)) [ 381.510531] batman_adv: batadv0: Adding interface: team0 17:05:41 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)) [ 381.544702] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 381.596448] batman_adv: batadv0: Interface activated: team0 17:05:41 executing program 1: add_key(&(0x7f0000000000)='.dead\x00', 0x0, &(0x7f0000000080)="0000000000000003ffffff000000000100000098d3e107ad2a9628bbf176bde4c5ebc04631c7b692e32b10418a923c8a957673fac428788c23f410a1540804cdf82ad56895e48c898e8ea1e4cffc463d046be9caf776b77575c4c7bd582b6e836d33775814de88a005dc3b9a206d2e74539ad512537f55a3c365f541eb6821e0cd1a33124377d07a37031a778d4a095d29b0da918cbd5736f6f4c42c9b5e1059f47cac2d64ee282bb17385be", 0xac, 0xfffffffffffffffd) 17:05:41 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x5}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000000)={{0x11, @private=0xa010101, 0x4e20, 0x1, 'sed\x00', 0x4, 0x9, 0x80}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x4e20, 0x10000, 0x2, 0xac6cba39, 0x8}}, 0x44) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x1c, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r0}, @void}}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048002}, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGETKEYCODE(r1, 0x5412, &(0x7f0000000080)={0x3}) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f00000012c0)={0x0, 0x9}) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x3}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0xffffffffffffffff) getpgrp(0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x44}}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffd333, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x20, 0x1410, 0x800, 0x0, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000001300), 0xc, &(0x7f0000001400)={0x0}, 0x1, 0x0, 0x0, 0x200088d0}, 0x8040) prlimit64(0x0, 0x9, 0x0, 0x0) 17:05:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 17:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 17:05:41 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) 17:05:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 17:05:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 381.786113] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:42 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) [ 381.841406] batman_adv: batadv0: Interface deactivated: team0 [ 381.871285] batman_adv: batadv0: Removing interface: team0 17:05:42 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000440)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x0, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x1, 0x8, {"e696c502d6ca28558cd3c3158d20a199"}, 0x6, 0x7f, 0x4}}}, 0xa0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) sendmsg$nl_route(r5, 0x0, 0xd69fa5821a3f190b) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) preadv(r6, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000240)=""/130, 0x82}], 0x2, 0x4, 0x6) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r9 = fcntl$dupfd(r6, 0x203, r3) ioctl$SNDCTL_SEQ_SYNC(r9, 0x5101) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="4800000010003b0e00000000000000901c2633fdf6c00c9f2eeea5699705e000f8000000", @ANYRES32=0x0, @ANYBLOB="0105000000000000200012800e0001006970366772657461700000000c00028008000100", @ANYRES32=r10, @ANYBLOB="08001f0007000000"], 0x48}}, 0x0) [ 381.898622] team0: Cannot enslave team device to itself [ 381.930402] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 381.957248] batman_adv: batadv0: Adding interface: team0 17:05:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 17:05:42 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) [ 381.980944] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 382.089770] batman_adv: batadv0: Interface activated: team0 [ 382.110046] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 382.131181] batman_adv: batadv0: Interface deactivated: team0 17:05:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 17:05:42 executing program 5 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 382.157570] batman_adv: batadv0: Removing interface: team0 [ 382.188635] team0: Cannot enslave team device to itself [ 382.219468] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 382.246827] batman_adv: batadv0: Adding interface: team0 17:05:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:42 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 382.273903] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 382.357101] batman_adv: batadv0: Interface activated: team0 [ 382.372956] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 382.396973] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 382.417642] batman_adv: batadv0: Interface deactivated: team0 [ 382.446967] batman_adv: batadv0: Removing interface: team0 17:05:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xe9, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="0100000000000f90fa8c0c16e3160040", 0x10, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed410000000400ded7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x5}, {&(0x7f0000000000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@i_version='i_version'}]}) 17:05:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:42 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x2, &(0x7f00000000c0)) 17:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:42 executing program 2: syz_genetlink_get_family_id$devlink(0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f00000003c0)=""/225, &(0x7f0000000280)=0xe1) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000a00)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x88}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000540)='./file0\x00', 0x12) ftruncate(r0, 0x8200) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000044c0)=[{{&(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10, 0x0}}], 0x1, 0x8800) close(0xffffffffffffffff) r3 = inotify_init() ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x84009422, &(0x7f0000000580)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) sendmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{0x0, 0x0, &(0x7f0000001e40)=[{0x0}], 0x1}}], 0x1, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x14, 0x7, 0x1, 0x401, 0x0, 0x0, {0x5, 0x0, 0x7}}, 0x14}}, 0x0) [ 382.467154] team0: Cannot enslave team device to itself [ 382.510900] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 382.529903] batman_adv: batadv0: Adding interface: team0 17:05:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x4, 0x6, 0x201}, 0x14}}, 0x0) [ 382.541032] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 382.569755] batman_adv: batadv0: Interface activated: team0 17:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:42 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x5421, &(0x7f00000000c0)) [ 382.638995] EXT4-fs (loop1): couldn't mount as ext3 due to feature incompatibilities 17:05:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x4, 0x6, 0x201}, 0x14}}, 0x0) 17:05:42 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x2, &(0x7f00000000c0)) 17:05:42 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x2, &(0x7f00000000c0)) 17:05:42 executing program 4 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x4, 0x6, 0x201}, 0x14}}, 0x0) 17:05:43 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x5450, &(0x7f00000000c0)) 17:05:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x4, 0x6, 0x201}, 0x14}}, 0x0) [ 382.874472] batman_adv: batadv0: Interface deactivated: team0 [ 382.906680] batman_adv: batadv0: Removing interface: team0 17:05:43 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:43 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x2, &(0x7f00000000c0)) 17:05:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x4, 0x6, 0x201}, 0x14}}, 0x0) [ 382.929407] FAULT_INJECTION: forcing a failure. [ 382.929407] name failslab, interval 1, probability 0, space 0, times 1 [ 382.961655] team0: Cannot enslave team device to itself [ 383.012088] CPU: 0 PID: 19505 Comm: syz-executor.4 Not tainted 4.19.163-syzkaller #0 [ 383.020005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.029365] Call Trace: [ 383.031977] dump_stack+0x1fc/0x2fe [ 383.035637] should_fail.cold+0xa/0x14 [ 383.039545] ? setup_fault_attr+0x200/0x200 [ 383.043878] ? lock_acquire+0x170/0x3c0 [ 383.047873] __should_failslab+0x115/0x180 [ 383.052122] should_failslab+0x5/0xf [ 383.055846] kmem_cache_alloc_node+0x245/0x3b0 17:05:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:43 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x5451, &(0x7f00000000c0)) [ 383.060446] __alloc_skb+0x71/0x560 [ 383.064092] netlink_sendmsg+0x9ee/0xc40 [ 383.068170] ? aa_af_perm+0x230/0x230 [ 383.071982] ? nlmsg_notify+0x1a0/0x1a0 [ 383.075963] ? kernel_recvmsg+0x220/0x220 [ 383.080134] ? nlmsg_notify+0x1a0/0x1a0 [ 383.084119] sock_sendmsg+0xc3/0x120 [ 383.087845] ___sys_sendmsg+0x7bb/0x8e0 [ 383.091831] ? check_preemption_disabled+0x41/0x280 [ 383.096902] ? copy_msghdr_from_user+0x440/0x440 [ 383.101668] ? __fget+0x32f/0x510 [ 383.105132] ? lock_downgrade+0x720/0x720 [ 383.109284] ? check_preemption_disabled+0x41/0x280 [ 383.114308] ? check_preemption_disabled+0x41/0x280 [ 383.119333] ? __fget+0x356/0x510 [ 383.122795] ? do_dup2+0x450/0x450 [ 383.126338] ? lock_downgrade+0x720/0x720 [ 383.130496] ? vfs_write+0x3d7/0x540 [ 383.134228] ? __fdget+0x1d0/0x230 [ 383.137785] __x64_sys_sendmsg+0x132/0x220 [ 383.142049] ? __sys_sendmsg+0x1b0/0x1b0 [ 383.146101] ? vfs_write+0x393/0x540 [ 383.149824] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 383.155196] ? trace_hardirqs_off_caller+0x6e/0x210 [ 383.160235] ? do_syscall_64+0x21/0x620 [ 383.164204] do_syscall_64+0xf9/0x620 [ 383.168015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.173192] RIP: 0033:0x45e149 [ 383.176378] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 383.195266] RSP: 002b:00007f409ea99c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 383.202974] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e149 [ 383.210231] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000006 [ 383.217495] RBP: 00007f409ea99ca0 R08: 0000000000000000 R09: 0000000000000000 [ 383.224758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 383.232039] R13: 00007fffdc7b2d8f R14: 00007f409ea9a9c0 R15: 000000000119c034 17:05:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:43 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r0, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:43 executing program 4 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:43 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f000023c000/0x4000)=nil, 0x4000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x1) 17:05:43 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x5452, &(0x7f00000000c0)) 17:05:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:43 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x2, &(0x7f00000000c0)) 17:05:43 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r0, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:43 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x5460, &(0x7f00000000c0)) [ 383.501736] team0: Cannot enslave team device to itself [ 383.533549] FAULT_INJECTION: forcing a failure. [ 383.533549] name failslab, interval 1, probability 0, space 0, times 0 [ 383.632507] CPU: 0 PID: 19540 Comm: syz-executor.4 Not tainted 4.19.163-syzkaller #0 [ 383.640659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.650024] Call Trace: [ 383.652633] dump_stack+0x1fc/0x2fe [ 383.656287] should_fail.cold+0xa/0x14 [ 383.660333] ? setup_fault_attr+0x200/0x200 [ 383.664674] ? lock_acquire+0x170/0x3c0 [ 383.668672] __should_failslab+0x115/0x180 [ 383.672931] should_failslab+0x5/0xf [ 383.676663] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 383.681788] __kmalloc_node_track_caller+0x38/0x70 [ 383.686738] __alloc_skb+0xae/0x560 [ 383.690387] netlink_sendmsg+0x9ee/0xc40 [ 383.694470] ? aa_af_perm+0x230/0x230 [ 383.698287] ? nlmsg_notify+0x1a0/0x1a0 [ 383.702275] ? kernel_recvmsg+0x220/0x220 [ 383.706446] ? nlmsg_notify+0x1a0/0x1a0 [ 383.710434] sock_sendmsg+0xc3/0x120 [ 383.714163] ___sys_sendmsg+0x7bb/0x8e0 [ 383.718152] ? check_preemption_disabled+0x41/0x280 [ 383.723186] ? copy_msghdr_from_user+0x440/0x440 [ 383.727959] ? __fget+0x32f/0x510 [ 383.731431] ? lock_downgrade+0x720/0x720 [ 383.735594] ? check_preemption_disabled+0x41/0x280 [ 383.740624] ? check_preemption_disabled+0x41/0x280 [ 383.745661] ? __fget+0x356/0x510 [ 383.749130] ? do_dup2+0x450/0x450 [ 383.752683] ? lock_downgrade+0x720/0x720 [ 383.757015] ? vfs_write+0x3d7/0x540 [ 383.760744] ? __fdget+0x1d0/0x230 [ 383.764295] __x64_sys_sendmsg+0x132/0x220 [ 383.768529] ? __sys_sendmsg+0x1b0/0x1b0 [ 383.772591] ? vfs_write+0x393/0x540 [ 383.776325] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 383.781692] ? trace_hardirqs_off_caller+0x6e/0x210 [ 383.786717] ? do_syscall_64+0x21/0x620 [ 383.790698] do_syscall_64+0xf9/0x620 [ 383.794505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.799695] RIP: 0033:0x45e149 [ 383.802891] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 383.822783] RSP: 002b:00007f409eabac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:05:44 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x5451, &(0x7f00000000c0)) 17:05:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 383.830501] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e149 [ 383.837857] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000006 [ 383.845144] RBP: 00007f409eabaca0 R08: 0000000000000000 R09: 0000000000000000 [ 383.852452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 383.859733] R13: 00007fffdc7b2d8f R14: 00007f409eabb9c0 R15: 000000000119bf8c 17:05:44 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r0, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:44 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x40049409, &(0x7f00000000c0)) 17:05:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x3, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:44 executing program 4 (fault-call:4 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:44 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x5451, &(0x7f00000000c0)) 17:05:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:44 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x4020940d, &(0x7f00000000c0)) 17:05:44 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') sendmsg$OSF_MSG_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f00000007c0)={0x710, 0x0, 0x5, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, [{{0x254, 0x1, {{0x1, 0x2}, 0x80, 0x1, 0x9ef0, 0x8001, 0x1b, 'syz1\x00', "fdbfec0c460f33b82bc7c50eff3f764091ccb16ff7d1594ffab37d8c333eb729", "dac2a273ade803b7046e2403871729f77ed8f3fad7f9b36cec0ea0a5f04c31ec", [{0x9, 0x4, {0x0, 0x800}}, {0x3, 0x5, {0x3, 0x4}}, {0x1, 0x8, {0x2, 0x8}}, {0xfbff, 0xdfdd, {0xc9bc2eb21cbc897b, 0x1}}, {0xa70, 0x41, {0x2, 0xf5}}, {0xcc9, 0xee, {0x3}}, {0x0, 0x6, {0x2, 0x7fff}}, {0x6, 0xde02, {0x3, 0x1}}, {0x33, 0x401, {0x2}}, {0xfffa, 0xca, {0x0, 0xffffffe1}}, {0x800, 0x1ff, {0x1, 0xa2}}, {0x2, 0x81, {0x2, 0x80000001}}, {0x4, 0x7, {0x1, 0x20}}, {0x0, 0x40, {0x2, 0x4}}, {0x6, 0x2, {0x2, 0x200}}, {0x0, 0x0, {0x3, 0x1000}}, {0x8000, 0x8, {0x2, 0x5}}, {0x3, 0x5, {0x2, 0xffffff50}}, {0x401, 0x7, {0x1, 0x400}}, {0x5, 0x7, {0x3, 0x8}}, {0x13, 0x6, {0x3, 0x7fff}}, {0xfff, 0x4, {0x3, 0x6}}, {0xd29, 0x3800, {0x0, 0x5}}, {0x5, 0xfffb, {0x0, 0x1}}, {0x5, 0x1, {0x0, 0xffff}}, {0x7ff, 0x1, {0x2, 0x754}}, {0x0, 0x4, {0x2, 0x1}}, {0xa457, 0x9, {0x2, 0x1}}, {0x48a, 0x9, {0x3, 0x80}}, {0x81, 0x99d, {0x0, 0xd7a}}, {0x408d, 0xfff, {0x3, 0x2}}, {0x7f, 0x5, {0x2, 0x5}}, {0xfff, 0xac, {0x0, 0xffffff0f}}, {0x8001, 0x4, {0x0, 0x9}}, {0x0, 0x8, {0x2, 0x2}}, {0x1, 0x6}, {0x1, 0x3fdb, {0x2, 0x1}}, {0x6, 0xc789, {0x1, 0x7}}, {0x3, 0x9, {0x3, 0x1}}, {0x9, 0x4, {0x2, 0xbf}}]}}}, {{0x254, 0x1, {{0x2}, 0x0, 0x3f, 0x3f, 0x9, 0x1, 'syz0\x00', "97f69a5ad6d828a6fd210e283cdc9cbfe58bd9421ee49c102a5d5a2b64bddfb4", "507bb345290525702c846228b8e3a2ff503559956281eee01bfadc6d9f301a92", [{0x401, 0x2, {0x0, 0x7}}, {0x6, 0x5, {0x3, 0x6}}, {0x9, 0x7, {0x0, 0x6}}, {0xfff8, 0x1f, {0x0, 0xf7a6}}, {0x9, 0xffff, {0x3, 0xba}}, {0x2, 0x7fff, {0x3, 0x167b}}, {0x1000, 0x8000, {0x1, 0x2}}, {0xef, 0x4, {0x0, 0xda5}}, {0xfc, 0x80, {0x1, 0x2}}, {0x6, 0x1000, {0x3, 0x7}}, {0x1, 0xbb, {0x2, 0x2}}, {0x5, 0x6, {0x1, 0x1f}}, {0x4, 0x5, {0x1, 0x9}}, {0xa19d, 0x0, {0x0, 0x5}}, {0x7, 0x3ff, {0x0, 0x10000}}, {0x1, 0x9, {0x0, 0x3}}, {0x8001, 0x8, {0x0, 0x1}}, {0x3, 0x200, {0x1, 0x9}}, {0x100, 0x1f, {0x3, 0xffffff7f}}, {0xffff, 0x144, {0x3, 0xffff8000}}, {0x101, 0x6fe, {0x3, 0x7fffffff}}, {0x3f, 0x909, {0x2, 0x1ff}}, {0x7, 0x5, {0x0, 0x7}}, {0x9, 0x7f, {0x0, 0xffff}}, {0xfffa, 0x3}, {0x5081, 0x9, {0x0, 0xac}}, {0x4, 0x7c, {0x1, 0x4}}, {0x8, 0x0, {0x3, 0x6}}, {0x72, 0x8, {0x2, 0x53}}, {0x1, 0x6, {0x1, 0x6}}, {0x395, 0x401, {0x1, 0x10000}}, {0x26, 0x2, {0x1, 0x41335aa1}}, {0x433d, 0x5, {0x3, 0x101}}, {0x0, 0x9, {0x0, 0x3}}, {0x3, 0x0, {0x1, 0x9}}, {0x8, 0xbc6e, {0x3, 0x3}}, {0x2, 0x6, {0x3, 0x5}}, {0x8001, 0x2, {0x0, 0x1}}, {0x3, 0x9, {0x1, 0x6}}, {0x6, 0x7, {0x2, 0x1}}]}}}, {{0x254, 0x1, {{0x3, 0x4}, 0xff, 0x0, 0xffc0, 0x8, 0x14, 'syz0\x00', "817d0a3d05a1b03cf864377f150930b13a45f42aadfd2d7147d47b74e7852ac0", "a8c1b2d9054626696d6ad867eb1c965df8da622241b146efaeec0c3f747f85a3", [{0x0, 0x1, {0x2, 0x5}}, {0x0, 0x88, {0x3, 0x9}}, {0xf70, 0x4, {0x2, 0x8}}, {0x1, 0x9, {0x0, 0x3ff}}, {0x0, 0xcc1, {0x2, 0x800}}, {0x81, 0x3, {0x0, 0x1}}, {0x1, 0x7, {0x3, 0x8}}, {0x9, 0x100, {0x3, 0x7}}, {0xff, 0x1, {0x0, 0x200}}, {0xff, 0x0, {0x3, 0x3}}, {0x699, 0x0, {0x2, 0x8001}}, {0x491a, 0x4, {0x1, 0x1}}, {0x2, 0x5, {0x3, 0x6}}, {0x3, 0x9, {0x3, 0x9}}, {0x8, 0x14d2, {0x1}}, {0x5, 0x2, {0x2, 0x6}}, {0x7, 0xf801, {0x1, 0x40}}, {0x380, 0x40, {0x3, 0x101}}, {0x7fff, 0x8, {0x0, 0x4}}, {0x1000, 0x7, {0x0, 0x6}}, {0x2, 0xbfa7, {0x0, 0x9}}, {0x6, 0x4, {0x3, 0x3e}}, {0x8, 0x5, {0x3, 0xfffffc9e}}, {0x34, 0x6, {0x2}}, {0x1, 0x1000, {0x0, 0x80}}, {0x100, 0x9, {0x2, 0x3}}, {0x6, 0xf5d, {0x0, 0x5}}, {0x1, 0x0, {0x0, 0x5}}, {0xff, 0x3, {0x2, 0x5cf6d2f6}}, {0x9, 0x9, {0x1, 0x19}}, {0x81, 0x2, {0x3, 0xf25d}}, {0x3, 0x8, {0x1, 0x3}}, {0x9, 0xfa5, {0x2, 0xbd}}, {0x1, 0x7, {0x1, 0x80000000}}, {0x3, 0x7c7a, {0x3, 0x5}}, {0x1ff, 0xd143, {0x1, 0x3ff}}, {0x0, 0x1}, {0x5, 0x6, {0x2, 0x20}}, {0x81, 0x7ff, {0x3, 0x5}}, {0x5, 0x401, {0x3, 0x97}}]}}}]}, 0x710}, 0x1, 0x0, 0x0, 0x48000}, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='./control\x00', 0xa4000960) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) 17:05:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:44 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0x5451, &(0x7f00000000c0)) 17:05:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x7, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 384.207943] team0: Cannot enslave team device to itself [ 384.245434] FAULT_INJECTION: forcing a failure. [ 384.245434] name failslab, interval 1, probability 0, space 0, times 0 17:05:44 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc0045878, &(0x7f00000000c0)) 17:05:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 384.319741] CPU: 0 PID: 19590 Comm: syz-executor.4 Not tainted 4.19.163-syzkaller #0 [ 384.327669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.337040] Call Trace: [ 384.339647] dump_stack+0x1fc/0x2fe [ 384.343293] should_fail.cold+0xa/0x14 [ 384.347193] ? setup_fault_attr+0x200/0x200 [ 384.351512] ? lock_downgrade+0x720/0x720 [ 384.355654] ? check_preemption_disabled+0x41/0x280 [ 384.360682] __should_failslab+0x115/0x180 [ 384.364921] should_failslab+0x5/0xf [ 384.368625] kmem_cache_alloc+0x3f/0x370 [ 384.372684] skb_clone+0x151/0x3d0 [ 384.376250] netlink_deliver_tap+0x955/0xb00 [ 384.380673] netlink_unicast+0x545/0x690 [ 384.384739] ? netlink_sendskb+0x110/0x110 [ 384.388964] ? _copy_from_iter_full+0x229/0x7c0 [ 384.393642] ? __phys_addr_symbol+0x2c/0x70 [ 384.397969] ? __check_object_size+0x17b/0x3d1 [ 384.402546] netlink_sendmsg+0x6bb/0xc40 [ 384.406599] ? aa_af_perm+0x230/0x230 [ 384.410403] ? nlmsg_notify+0x1a0/0x1a0 [ 384.414366] ? kernel_recvmsg+0x220/0x220 [ 384.418523] ? nlmsg_notify+0x1a0/0x1a0 [ 384.422486] sock_sendmsg+0xc3/0x120 [ 384.426195] ___sys_sendmsg+0x7bb/0x8e0 [ 384.430169] ? check_preemption_disabled+0x41/0x280 [ 384.435174] ? copy_msghdr_from_user+0x440/0x440 [ 384.439931] ? __fget+0x32f/0x510 [ 384.443378] ? lock_downgrade+0x720/0x720 [ 384.447512] ? check_preemption_disabled+0x41/0x280 [ 384.452516] ? check_preemption_disabled+0x41/0x280 [ 384.457539] ? __fget+0x356/0x510 [ 384.460996] ? do_dup2+0x450/0x450 [ 384.464530] ? lock_downgrade+0x720/0x720 [ 384.468685] ? vfs_write+0x3d7/0x540 [ 384.472402] ? __fdget+0x1d0/0x230 [ 384.475939] __x64_sys_sendmsg+0x132/0x220 [ 384.480160] ? __sys_sendmsg+0x1b0/0x1b0 [ 384.484207] ? vfs_write+0x393/0x540 [ 384.487933] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 384.493286] ? trace_hardirqs_off_caller+0x6e/0x210 [ 384.498291] ? do_syscall_64+0x21/0x620 [ 384.502257] do_syscall_64+0xf9/0x620 [ 384.506049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.511225] RIP: 0033:0x45e149 [ 384.514406] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 384.533292] RSP: 002b:00007f409eabac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 384.540988] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e149 [ 384.548263] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000006 [ 384.555530] RBP: 00007f409eabaca0 R08: 0000000000000000 R09: 0000000000000000 [ 384.562785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:05:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0xd2, &(0x7f0000000200)={@broadcast, @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010100", 0x9c, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4]}, @mcast2, {[], {0x0, 0xe22, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "9aabcbf87c673ed9b752c0d1eca0a4c9a63a29f7447dcd3ec73256d4262d6c44", "335ba6296f1df1d0d4c35921ecac6eb7164e40e9dd36ecff6952ea14b7ce14e362cf2e35da24c70b3b722a8a383d985a", "01040311304304ac2fa64d1a721563589a2c78f5e5db77d7711cb9b5", {"11bcc8e3bf2abcae7311db493b572b0b", "c900905b062714fe4b7cb6376d49b02c"}}}}}}}}, 0x0) recvmmsg(r0, &(0x7f0000005fc0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/109, 0x6d}, {&(0x7f0000000140)=""/59, 0x3b}], 0x2}}], 0x1, 0x0, 0x0) shmdt(0x0) [ 384.570043] R13: 00007fffdc7b2d8f R14: 00007f409eabb9c0 R15: 000000000119bf8c 17:05:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x8, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 384.745522] batman_adv: batadv0: Adding interface: team0 [ 384.789067] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 384.837190] batman_adv: batadv0: Interface activated: team0 17:05:45 executing program 4 (fault-call:4 fault-nth:3): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0xd2, &(0x7f0000000200)={@broadcast, @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010100", 0x9c, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4]}, @mcast2, {[], {0x0, 0xe22, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "9aabcbf87c673ed9b752c0d1eca0a4c9a63a29f7447dcd3ec73256d4262d6c44", "335ba6296f1df1d0d4c35921ecac6eb7164e40e9dd36ecff6952ea14b7ce14e362cf2e35da24c70b3b722a8a383d985a", "01040311304304ac2fa64d1a721563589a2c78f5e5db77d7711cb9b5", {"11bcc8e3bf2abcae7311db493b572b0b", "c900905b062714fe4b7cb6376d49b02c"}}}}}}}}, 0x0) recvmmsg(r0, &(0x7f0000005fc0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/109, 0x6d}, {&(0x7f0000000140)=""/59, 0x3b}], 0x2}}], 0x1, 0x0, 0x0) shmdt(0x0) 17:05:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xe, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:45 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc0045878, &(0x7f00000000c0)) 17:05:45 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc0045878, &(0x7f00000000c0)) 17:05:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x7, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000004a000100000000589fbf78c8f5a0f4c4edcf2033bce800000000000a000000", @ANYRES32=0x0, @ANYBLOB="000000000800020000000000"], 0x24}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) sendmsg$RDMA_NLDEV_CMD_DELLINK(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x50, 0x1404, 0x305, 0x70bd2d, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0xc601}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x24000015}, 0x20000000) [ 384.983539] batman_adv: batadv0: Interface deactivated: team0 [ 385.011640] batman_adv: batadv0: Removing interface: team0 17:05:45 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c64c9, &(0x7f00000000c0)) [ 385.062747] team0: Cannot enslave team device to itself [ 385.096152] FAULT_INJECTION: forcing a failure. [ 385.096152] name failslab, interval 1, probability 0, space 0, times 0 [ 385.135752] CPU: 1 PID: 19632 Comm: syz-executor.4 Not tainted 4.19.163-syzkaller #0 [ 385.143681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.153038] Call Trace: [ 385.155626] dump_stack+0x1fc/0x2fe [ 385.159257] should_fail.cold+0xa/0x14 [ 385.163146] ? setup_fault_attr+0x200/0x200 [ 385.167474] ? lock_acquire+0x170/0x3c0 [ 385.171456] __should_failslab+0x115/0x180 [ 385.175682] should_failslab+0x5/0xf [ 385.179383] kmem_cache_alloc_trace+0x284/0x380 [ 385.184057] __netdev_adjacent_dev_insert+0x1d8/0x9c0 [ 385.189235] ? is_hsr_master+0x9/0x70 [ 385.193023] ? napi_disable+0xb0/0xb0 [ 385.196810] ? ip6_route_dev_notify+0xd7/0xcd0 [ 385.201385] ? notifier_call_chain+0x1d5/0x230 [ 385.205963] __netdev_upper_dev_link+0x299/0x770 [ 385.210712] ? __netdev_adjacent_dev_remove+0x670/0x670 [ 385.216066] ? flush_old_exec+0x1bc1/0x1cc0 [ 385.220384] ? check_preemption_disabled+0x41/0x280 [ 385.225401] batadv_hardif_enable_interface+0x250/0xba0 [ 385.230760] batadv_softif_slave_add+0x8a/0x100 [ 385.235463] ? batadv_softif_slave_del+0xc0/0xc0 [ 385.240207] do_set_master+0x1c8/0x220 [ 385.244092] do_setlink+0x7ec/0x3540 [ 385.247805] ? rtnl_fdb_add+0xa10/0xa10 [ 385.251772] ? ___ratelimit+0x314/0x584 [ 385.255746] ? mark_held_locks+0xa6/0xf0 [ 385.259794] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 385.264887] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 385.269464] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 385.274814] ? ___ratelimit+0x319/0x584 [ 385.278780] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 385.283963] ? validate_nla+0x270/0x820 [ 385.287934] ? nla_parse+0x1b2/0x290 [ 385.291652] rtnl_newlink+0xda0/0x15b0 [ 385.295539] ? rtnl_getlink+0x620/0x620 [ 385.299510] ? __lock_acquire+0x6de/0x3ff0 [ 385.303737] ? __lock_acquire+0x6de/0x3ff0 [ 385.307963] ? unwind_next_frame+0x10a9/0x1c60 [ 385.312534] ? __save_stack_trace+0x72/0x190 [ 385.316940] ? mark_held_locks+0xf0/0xf0 [ 385.320988] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 385.326864] ? __lock_acquire+0x6de/0x3ff0 [ 385.331119] ? __update_load_avg_se+0x5ec/0xa00 [ 385.335793] ? mark_held_locks+0xf0/0xf0 [ 385.339865] ? __lock_acquire+0x6de/0x3ff0 [ 385.344105] ? mark_held_locks+0xf0/0xf0 [ 385.348152] ? _raw_spin_unlock_irq+0x24/0x80 [ 385.352649] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 385.357217] ? _raw_spin_unlock_irq+0x5a/0x80 [ 385.361698] ? finish_task_switch+0x146/0x780 [ 385.366190] ? finish_task_switch+0x118/0x780 [ 385.370726] ? __mutex_add_waiter+0x160/0x160 [ 385.375209] ? check_preemption_disabled+0x41/0x280 [ 385.380227] ? rtnetlink_rcv_msg+0x3c3/0xb80 [ 385.384644] ? rtnl_getlink+0x620/0x620 [ 385.388607] rtnetlink_rcv_msg+0x453/0xb80 [ 385.392835] ? rtnl_calcit.isra.0+0x430/0x430 [ 385.397319] ? memcpy+0x35/0x50 [ 385.400587] ? netdev_pick_tx+0x2f0/0x2f0 [ 385.404723] ? __copy_skb_header+0x414/0x500 [ 385.409132] ? kfree_skbmem+0x140/0x140 [ 385.413123] netlink_rcv_skb+0x160/0x440 [ 385.417176] ? rtnl_calcit.isra.0+0x430/0x430 [ 385.421662] ? netlink_ack+0xae0/0xae0 [ 385.425555] netlink_unicast+0x4d5/0x690 [ 385.429617] ? netlink_sendskb+0x110/0x110 [ 385.433839] ? _copy_from_iter_full+0x229/0x7c0 [ 385.438495] ? __phys_addr_symbol+0x2c/0x70 [ 385.442804] ? __check_object_size+0x17b/0x3d1 [ 385.447392] netlink_sendmsg+0x6bb/0xc40 [ 385.451460] ? aa_af_perm+0x230/0x230 [ 385.455249] ? nlmsg_notify+0x1a0/0x1a0 [ 385.459210] ? kernel_recvmsg+0x220/0x220 [ 385.463356] ? nlmsg_notify+0x1a0/0x1a0 [ 385.467319] sock_sendmsg+0xc3/0x120 [ 385.471025] ___sys_sendmsg+0x7bb/0x8e0 [ 385.474989] ? check_preemption_disabled+0x41/0x280 [ 385.480104] ? copy_msghdr_from_user+0x440/0x440 [ 385.484876] ? __fget+0x32f/0x510 [ 385.488795] ? lock_downgrade+0x720/0x720 [ 385.492943] ? check_preemption_disabled+0x41/0x280 [ 385.497961] ? check_preemption_disabled+0x41/0x280 [ 385.502980] ? __fget+0x356/0x510 [ 385.506431] ? do_dup2+0x450/0x450 [ 385.509962] ? lock_downgrade+0x720/0x720 [ 385.514101] ? vfs_write+0x3d7/0x540 [ 385.517810] ? __fdget+0x1d0/0x230 [ 385.521346] __x64_sys_sendmsg+0x132/0x220 [ 385.525571] ? __sys_sendmsg+0x1b0/0x1b0 [ 385.529618] ? vfs_write+0x393/0x540 [ 385.533352] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 385.538703] ? trace_hardirqs_off_caller+0x6e/0x210 [ 385.543746] ? do_syscall_64+0x21/0x620 [ 385.547739] do_syscall_64+0xf9/0x620 [ 385.551543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.556742] RIP: 0033:0x45e149 [ 385.559924] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.578811] RSP: 002b:00007f409ea99c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 385.586504] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e149 [ 385.593760] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000006 [ 385.601025] RBP: 00007f409ea99ca0 R08: 0000000000000000 R09: 0000000000000000 [ 385.608280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 385.615534] R13: 00007fffdc7b2d8f R14: 00007f409ea9a9c0 R15: 000000000119c034 17:05:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x60, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:45 executing program 4 (fault-call:4 fault-nth:4): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:45 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x5, 0xd43, 0x8b8}}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:45 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020000100010005000000001c08107f13", 0x4f, 0x400}, {&(0x7f0000010100)="ff000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff03f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed415cf970000000e7c2645f5303", 0x80e, 0x800}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) r0 = openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000100)=ANY=[], 0x1c) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x54, r3, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xff}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x8, 0x1, 0x4, 0x3f]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5a6}, @SEG6_ATTR_SECRET={0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0xc800}, 0x48010) 17:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:45 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc0189436, &(0x7f00000000c0)) 17:05:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xe0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 385.811826] validate_nla: 6 callbacks suppressed [ 385.811836] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:46 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c64c9, &(0x7f00000000c0)) [ 385.875632] team0: Cannot enslave team device to itself [ 385.903324] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 385.919041] FAULT_INJECTION: forcing a failure. 17:05:46 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc020660b, &(0x7f00000000c0)) [ 385.919041] name failslab, interval 1, probability 0, space 0, times 0 17:05:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 385.999777] CPU: 1 PID: 19664 Comm: syz-executor.4 Not tainted 4.19.163-syzkaller #0 [ 386.007695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.017061] Call Trace: [ 386.019674] dump_stack+0x1fc/0x2fe [ 386.023323] should_fail.cold+0xa/0x14 [ 386.027228] ? setup_fault_attr+0x200/0x200 [ 386.031562] ? lock_acquire+0x170/0x3c0 [ 386.035559] __should_failslab+0x115/0x180 [ 386.039805] should_failslab+0x5/0xf [ 386.043523] __kmalloc_track_caller+0x2a6/0x3c0 [ 386.048184] ? kstrdup_const+0x53/0x80 [ 386.052067] kstrdup+0x36/0x70 [ 386.055339] kstrdup_const+0x53/0x80 [ 386.059061] __kernfs_new_node+0x9b/0x680 [ 386.063204] ? mark_held_locks+0xf0/0xf0 [ 386.067263] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 386.072015] ? vsnprintf+0x2cc/0x14f0 [ 386.075815] ? pointer+0x850/0x850 [ 386.079350] ? sysfs_do_create_link_sd+0x82/0x130 [ 386.084288] kernfs_new_node+0x92/0x120 [ 386.088257] kernfs_create_link+0xd1/0x228 [ 386.092498] sysfs_do_create_link_sd+0x90/0x130 [ 386.097203] sysfs_create_link+0x5f/0xc0 [ 386.101264] __netdev_adjacent_dev_insert+0x708/0x9c0 [ 386.106451] ? napi_disable+0xb0/0xb0 [ 386.110246] ? ip6_route_dev_notify+0xd7/0xcd0 [ 386.114827] ? notifier_call_chain+0x1d5/0x230 [ 386.119412] __netdev_upper_dev_link+0x299/0x770 [ 386.124161] ? __netdev_adjacent_dev_remove+0x670/0x670 [ 386.129517] ? flush_old_exec+0x1bc1/0x1cc0 [ 386.133828] ? check_preemption_disabled+0x41/0x280 [ 386.138944] batadv_hardif_enable_interface+0x250/0xba0 [ 386.144310] batadv_softif_slave_add+0x8a/0x100 [ 386.148981] ? batadv_softif_slave_del+0xc0/0xc0 [ 386.153729] do_set_master+0x1c8/0x220 [ 386.157609] do_setlink+0x7ec/0x3540 [ 386.161318] ? __irq_work_queue_local+0x101/0x160 [ 386.166155] ? rtnl_fdb_add+0xa10/0xa10 [ 386.170116] ? wake_up_klogd.part.0+0x8c/0xc0 [ 386.174599] ? vprintk_emit+0x1d0/0x740 [ 386.178569] ? vprintk_func+0x81/0x17e [ 386.182458] ? printk+0xba/0xed [ 386.185740] ? log_store.cold+0x16/0x16 [ 386.189706] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 386.194389] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 386.199491] ? ___ratelimit+0x319/0x584 [ 386.203457] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 386.208650] ? validate_nla+0x270/0x820 [ 386.212633] ? nla_parse+0x1b2/0x290 [ 386.216344] rtnl_newlink+0xda0/0x15b0 [ 386.220231] ? rtnl_getlink+0x620/0x620 [ 386.224213] ? __lock_acquire+0x6de/0x3ff0 [ 386.228441] ? mark_held_locks+0xf0/0xf0 [ 386.232492] ? mark_held_locks+0xf0/0xf0 [ 386.236552] ? unwind_next_frame+0x10a9/0x1c60 [ 386.241125] ? __save_stack_trace+0x72/0x190 [ 386.245521] ? mark_held_locks+0xf0/0xf0 [ 386.249583] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 386.255458] ? __lock_acquire+0x6de/0x3ff0 [ 386.259692] ? update_curr+0x3b9/0x870 [ 386.263569] ? mark_held_locks+0xf0/0xf0 [ 386.267637] ? __lock_acquire+0x6de/0x3ff0 [ 386.271877] ? mark_held_locks+0xf0/0xf0 [ 386.275926] ? _raw_spin_unlock_irq+0x24/0x80 [ 386.280411] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 386.284985] ? finish_task_switch+0x1db/0x780 [ 386.289521] ? __mutex_add_waiter+0x160/0x160 [ 386.294004] ? check_preemption_disabled+0x41/0x280 [ 386.299018] ? rtnetlink_rcv_msg+0x3c3/0xb80 [ 386.303429] ? rtnl_getlink+0x620/0x620 [ 386.307397] rtnetlink_rcv_msg+0x453/0xb80 [ 386.311628] ? rtnl_calcit.isra.0+0x430/0x430 [ 386.316113] ? memcpy+0x35/0x50 [ 386.319385] ? netdev_pick_tx+0x2f0/0x2f0 [ 386.323520] ? __copy_skb_header+0x414/0x500 [ 386.327915] ? kfree_skbmem+0x140/0x140 [ 386.331884] netlink_rcv_skb+0x160/0x440 [ 386.335936] ? rtnl_calcit.isra.0+0x430/0x430 [ 386.340435] ? netlink_ack+0xae0/0xae0 [ 386.344329] netlink_unicast+0x4d5/0x690 [ 386.348384] ? netlink_sendskb+0x110/0x110 [ 386.352607] ? _copy_from_iter_full+0x229/0x7c0 [ 386.357284] ? __phys_addr_symbol+0x2c/0x70 [ 386.361594] ? __check_object_size+0x17b/0x3d1 [ 386.366174] netlink_sendmsg+0x6bb/0xc40 [ 386.370230] ? aa_af_perm+0x230/0x230 [ 386.374020] ? nlmsg_notify+0x1a0/0x1a0 [ 386.378342] ? kernel_recvmsg+0x220/0x220 [ 386.382487] ? nlmsg_notify+0x1a0/0x1a0 [ 386.386450] sock_sendmsg+0xc3/0x120 [ 386.390155] ___sys_sendmsg+0x7bb/0x8e0 [ 386.394120] ? check_preemption_disabled+0x41/0x280 [ 386.399124] ? copy_msghdr_from_user+0x440/0x440 [ 386.403871] ? __fget+0x32f/0x510 [ 386.407317] ? lock_downgrade+0x720/0x720 [ 386.411453] ? check_preemption_disabled+0x41/0x280 [ 386.416458] ? check_preemption_disabled+0x41/0x280 [ 386.421469] ? __fget+0x356/0x510 [ 386.424923] ? do_dup2+0x450/0x450 [ 386.428450] ? lock_downgrade+0x720/0x720 [ 386.432588] ? vfs_write+0x3d7/0x540 [ 386.436292] ? __fdget+0x1d0/0x230 [ 386.439831] __x64_sys_sendmsg+0x132/0x220 [ 386.444052] ? __sys_sendmsg+0x1b0/0x1b0 [ 386.448097] ? vfs_write+0x393/0x540 [ 386.451826] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 386.457180] ? trace_hardirqs_off_caller+0x6e/0x210 [ 386.462192] ? do_syscall_64+0x21/0x620 [ 386.466160] do_syscall_64+0xf9/0x620 [ 386.469952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.475131] RIP: 0033:0x45e149 [ 386.478321] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 386.497219] RSP: 002b:00007f409ea99c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 386.504924] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e149 [ 386.512189] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000006 [ 386.519454] RBP: 00007f409ea99ca0 R08: 0000000000000000 R09: 0000000000000000 [ 386.526710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 386.533967] R13: 00007fffdc7b2d8f R14: 00007f409ea9a9c0 R15: 000000000119c034 17:05:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xf0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x300, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x700, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 386.999317] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 387.051696] team0: Cannot enslave team device to itself [ 387.095071] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 387.108981] batman_adv: batadv0: Adding interface: team0 [ 387.131890] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 387.227829] batman_adv: batadv0: Interface activated: team0 17:05:47 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c64c9, &(0x7f00000000c0)) 17:05:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xe00, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:47 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 387.489477] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 387.524373] batman_adv: batadv0: Interface deactivated: team0 17:05:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xf00, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:47 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x2}) 17:05:47 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 387.553810] batman_adv: batadv0: Removing interface: team0 [ 387.603363] team0: Cannot enslave team device to itself [ 387.632284] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 387.658649] batman_adv: batadv0: Adding interface: team0 17:05:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x6000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 387.692336] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:47 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x2000000}) 17:05:47 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x3}]}) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') [ 387.835138] batman_adv: batadv0: Interface activated: team0 17:05:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xe000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 387.892660] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 387.913278] batman_adv: batadv0: Interface deactivated: team0 [ 387.958060] batman_adv: batadv0: Removing interface: team0 [ 387.985523] team0: Cannot enslave team device to itself [ 387.996386] audit: type=1326 audit(1608829548.184:55): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=19764 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0x0 [ 387.996496] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 388.055551] batman_adv: batadv0: Adding interface: team0 [ 388.062787] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 388.100100] batman_adv: batadv0: Interface activated: team0 17:05:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:48 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000100)={@rand_addr=' \x01\x00', 0xf, r1}) 17:05:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xf000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xf0ffff, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 388.232395] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 388.269155] batman_adv: batadv0: Interface deactivated: team0 17:05:48 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0']) chdir(&(0x7f0000000080)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)) 17:05:48 executing program 5: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x4, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x13}, @val={0x8, 0x3, r0}, @void}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0x4) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) 17:05:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) [ 388.305337] batman_adv: batadv0: Removing interface: team0 [ 388.337579] team0: Cannot enslave team device to itself 17:05:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 388.371453] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 388.389636] batman_adv: batadv0: Adding interface: team0 [ 388.417580] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 388.555103] batman_adv: batadv0: Interface activated: team0 [ 388.628843] audit: type=1326 audit(1608829548.814:56): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=19764 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0x0 17:05:48 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80101, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f00000000c0)={&(0x7f0000000080)=""/41, 0x29, 0x7f, 0x702b}) r2 = dup(r1) write$vga_arbiter(r2, &(0x7f0000000180)=ANY=[], 0xd) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$SNDCTL_DSP_SETFRAGMENT(r5, 0xc004500a, &(0x7f0000000100)=0x7fff) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000000)=0x41b) r6 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x7ff, 0x40) ioctl$VHOST_GET_VRING_ENDIAN(r6, 0x4008af14, &(0x7f0000000180)={0x2, 0x5528db13}) 17:05:48 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x16, 0x0, 0x0, 0x17800, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000}, 0x40, 0x0, 0xffff0001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000100)=0x6edf) r2 = socket$inet(0x10, 0x9, 0x4) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0x0, 0x9, 0x0, "9e82df673a5731f131c4e258515dbeecd079c61671e2aace716b36c9516ab32e", 0x3631564e}) 17:05:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:49 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x4c, 0x1, 0x1, 0x5, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_SEQ_ADJ_REPLY={0x1c, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x7fff}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x80000001}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1b64e0}, @CTA_STATUS={0x8}, @CTA_LABELS_MASK={0xc, 0x17, [0x7ff, 0xffffff01]}]}, 0x4c}}, 0x20000000) accept4$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @bcast}, [@default, @bcast, @null, @netrom, @default, @null, @default, @default]}, &(0x7f0000000300)=0x48, 0x80800) [ 388.814656] batman_adv: batadv0: Interface deactivated: team0 [ 388.853175] batman_adv: batadv0: Removing interface: team0 17:05:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x83, &(0x7f0000000000)={r2}, 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={r2, 0x10001}, 0x8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r3, &(0x7f0000003800)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[@mark={{0x14}}], 0x18}}], 0x1, 0x0) 17:05:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x3000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 388.943534] overlayfs: './bus' not a directory [ 388.945705] team0: Cannot enslave team device to itself 17:05:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:49 executing program 5: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000100)=""/166) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x4000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:49 executing program 2: ioctl$CHAR_RAW_REPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/451]) openat$bsg(0xffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x5f) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580)='nl80211\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BEACON(r8, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000008c0)={0x30, r5, 0x401, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_IE_PROBE_RESP={0xc, 0x7f, [@mesh_chsw={0x76, 0x6}]}, @NL80211_ATTR_FTM_RESPONDER={0x8, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x4}]}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r3, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x8c, r4, 0x8, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0xec, 0x32}}}}, [@NL80211_ATTR_IE={0x3a, 0x2a, [@prep={0x83, 0x1f, @not_ext={{}, 0x9, 0x40, @device_a, 0x5, "", 0x401, 0x400, @broadcast, 0x8}}, @ssid={0x0, 0x6, @default_ap_ssid}, @chsw_timing={0x68, 0x4, {0x8}}, @supported_rates={0x1, 0x5, [{0x48}, {0x36, 0x1}, {0x9}, {0x1b}, {0x5, 0x1}]}]}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x58}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x66}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x8c}, 0x1, 0x0, 0x0, 0x725d291948b323c7}, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0xfffffffe}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 388.987276] batman_adv: batadv0: Adding interface: team0 [ 388.995366] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x7000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:49 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '$'}) [ 389.097108] batman_adv: batadv0: Interface activated: team0 [ 389.131273] batman_adv: batadv0: Interface deactivated: team0 17:05:49 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000180)={0xbcde}) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200000, 0x0) sendmsg$AUDIT_USER(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb4, 0x3ed, 0x10, 0x70bd2c, 0x25dfdbff, "1345662acd5804a03e7b8fb3bf2594e9fabb7d4d522e3eb838a7a0a29069c353335034920d27e18950db64b0b3bd793f03b315eac7c7076dee3077f2b3694db03f3bafa7ab8ad0356592a36a0b5cfaeba2482a3881f9de058bb23187b0aa333167d4f24db056db146e05664b6af00412fde8f102dee226c680d33deeb3fd3219549ee58c5b451cae2b9fa5d1ab651ec3506e9f7e64c310af8ab5f23414e0bdbcc2ffd2b7", ["", "", "", ""]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000015}, 0x4000040) [ 389.156235] batman_adv: batadv0: Removing interface: team0 17:05:49 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x7d, 0x6, 0x7, 0xfffffffc, 0x7}) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)) [ 389.196939] team0: Cannot enslave team device to itself [ 389.244593] batman_adv: batadv0: Adding interface: team0 [ 389.250094] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x8000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 389.342495] batman_adv: batadv0: Interface activated: team0 17:05:49 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x0) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000}}, 0x0, 0x0, r0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) 17:05:49 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000180)={0xbcde}) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200000, 0x0) sendmsg$AUDIT_USER(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb4, 0x3ed, 0x10, 0x70bd2c, 0x25dfdbff, "1345662acd5804a03e7b8fb3bf2594e9fabb7d4d522e3eb838a7a0a29069c353335034920d27e18950db64b0b3bd793f03b315eac7c7076dee3077f2b3694db03f3bafa7ab8ad0356592a36a0b5cfaeba2482a3881f9de058bb23187b0aa333167d4f24db056db146e05664b6af00412fde8f102dee226c680d33deeb3fd3219549ee58c5b451cae2b9fa5d1ab651ec3506e9f7e64c310af8ab5f23414e0bdbcc2ffd2b7", ["", "", "", ""]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000015}, 0x4000040) 17:05:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xe000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 389.493911] batman_adv: batadv0: Interface deactivated: team0 [ 389.525302] batman_adv: batadv0: Removing interface: team0 [ 389.557795] team0: Cannot enslave team device to itself [ 389.585091] batman_adv: batadv0: Adding interface: team0 17:05:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) [ 389.596645] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 389.726048] batman_adv: batadv0: Interface activated: team0 [ 389.758565] batman_adv: batadv0: Interface deactivated: team0 [ 389.772171] batman_adv: batadv0: Removing interface: team0 [ 389.814868] team0: Cannot enslave team device to itself [ 389.822022] batman_adv: batadv0: Adding interface: team0 [ 389.828757] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 389.869389] batman_adv: batadv0: Interface activated: team0 17:05:50 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) r4 = getpgid(0x0) getpeername$l2tp6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000780)="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", 0x2000, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x5) sched_setattr(0x0, &(0x7f0000000040)={0x99, 0x2}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0x0) writev(r5, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcff86ff77040300000020000000002000000000000040000000000008000000", 0x200000bf}], 0x2) 17:05:50 executing program 5: r0 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x5c, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0xff00}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @multicast2}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r3, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xa08a}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20004000}, 0x804) 17:05:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xf000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:50 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000180)={0xbcde}) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200000, 0x0) sendmsg$AUDIT_USER(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb4, 0x3ed, 0x10, 0x70bd2c, 0x25dfdbff, "1345662acd5804a03e7b8fb3bf2594e9fabb7d4d522e3eb838a7a0a29069c353335034920d27e18950db64b0b3bd793f03b315eac7c7076dee3077f2b3694db03f3bafa7ab8ad0356592a36a0b5cfaeba2482a3881f9de058bb23187b0aa333167d4f24db056db146e05664b6af00412fde8f102dee226c680d33deeb3fd3219549ee58c5b451cae2b9fa5d1ab651ec3506e9f7e64c310af8ab5f23414e0bdbcc2ffd2b7", ["", "", "", ""]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000015}, 0x4000040) 17:05:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x60000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 390.083065] batman_adv: batadv0: Interface deactivated: team0 [ 390.112891] batman_adv: batadv0: Removing interface: team0 [ 390.147184] team0: Cannot enslave team device to itself [ 390.186609] batman_adv: batadv0: Adding interface: team0 17:05:50 executing program 5: r0 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000200)={r2, 0xffffffffffffffff, 0x3, 0xef, &(0x7f0000000100)="84889ca84a7d63f710fe1e60f19b0c8e712c69ee40719d93c395c1c670437aa9f326aba12d704652b9e712a3b58199424a9fc153c67875b8cd2b0bdaaf80902b870f295aff3e81bcca25a0b7d988a16c378bb644babd502ff05fba76b5e30abbcdd0e1e41b87d04e349e156132d94a03a03087dcf8b3bb50012a9452178c69518a38a6ef657aaf5c1608fa554c646f1468f4bf17da9708d08e84469818ad86c961dee6a3b59da5639bab7f818622da3bfe440ec587f48383df724dc2369e80abfbf05a09fed999fb5ed0002919deef2163dad4c4d4ccc4b9b25d4e32ebcb5e339c6066dd7e48f89417958b67549776", 0x1, 0x6, 0x5, 0x4, 0x7, 0x1, 0x1, 'syz0\x00'}) socket$phonet(0x23, 0x2, 0x1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/video1\x00', 0x2, 0x0) fcntl$setown(r3, 0x8, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x6000, 0x1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)=0x0) fchown(0xffffffffffffffff, r7, r8) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400}, 0xc, &(0x7f0000000580)=[{&(0x7f00000003c0)={0x11c, 0x2f, 0x10, 0x70bd2c, 0x25dfdbfb, "", [@generic="18ac9687e95d153b2171c15081f0c982240cc9063e450aec3da55aa325f7223c3d5ab00c3f2b26553fdfb6cb9b213eab19da9ca0919dc115876270e2d68cc930f1097f3c4ae43951ac7ab8664abbc49735ded35759f80df0b990e45a7c50a9a5533636fbdb0271e926e68594dbf2205683c83478e67b673f6fadd05ba5f4634debf085c291e8d474e4459452f9576f733113ca5f9c99", @nested={0x6f, 0x3f, 0x0, 0x1, [@typed={0x8, 0x26, 0x0, 0x0, @u32=0x6}, @generic="6b984e356a12a40a24191d6735ca81d558c85b141acafaf8519faefff077da2257a32b17328d13996f5ec07055fd4c", @typed={0x8, 0x1e, 0x0, 0x0, @uid=r4}, @typed={0x5, 0x3a, 0x0, 0x0, @str='\x00'}, @generic="ea5c8bfedfa971fae2ec16a8d71d9613b81479a32d8c7522a8a20ac6780091f58ac5aa8d"]}, @typed={0x4, 0x90}]}, 0x11c}, {&(0x7f0000000500)={0x38, 0x39, 0x400, 0x70bd2a, 0x25dfdbfd, "", [@generic, @nested={0x27, 0x8d, 0x0, 0x1, [@generic="e888c26073dec2e8c253daff98dac1", @typed={0x14, 0x51, 0x0, 0x0, @ipv6=@local}]}]}, 0x38}, {&(0x7f0000000540)={0x24, 0x22, 0x20, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x14, 0x57, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x24}], 0x3, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {r5, 0xee01, r6}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @rights={{0x20, 0x1, 0x1, [r1, r1, r0, r2]}}], 0x80, 0x20014040}, 0x1) 17:05:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x9effffff, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 390.196939] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xe0000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 390.342365] batman_adv: batadv0: Interface activated: team0 17:05:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) [ 390.414582] batman_adv: batadv0: Interface deactivated: team0 [ 390.429848] batman_adv: batadv0: Removing interface: team0 [ 390.488376] team0: Cannot enslave team device to itself [ 390.519176] batman_adv: batadv0: Adding interface: team0 [ 390.529934] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:50 executing program 2: r0 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000200)={r2, 0xffffffffffffffff, 0x3, 0xef, &(0x7f0000000100)="84889ca84a7d63f710fe1e60f19b0c8e712c69ee40719d93c395c1c670437aa9f326aba12d704652b9e712a3b58199424a9fc153c67875b8cd2b0bdaaf80902b870f295aff3e81bcca25a0b7d988a16c378bb644babd502ff05fba76b5e30abbcdd0e1e41b87d04e349e156132d94a03a03087dcf8b3bb50012a9452178c69518a38a6ef657aaf5c1608fa554c646f1468f4bf17da9708d08e84469818ad86c961dee6a3b59da5639bab7f818622da3bfe440ec587f48383df724dc2369e80abfbf05a09fed999fb5ed0002919deef2163dad4c4d4ccc4b9b25d4e32ebcb5e339c6066dd7e48f89417958b67549776", 0x1, 0x6, 0x5, 0x4, 0x7, 0x1, 0x1, 'syz0\x00'}) socket$phonet(0x23, 0x2, 0x1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/video1\x00', 0x2, 0x0) fcntl$setown(r3, 0x8, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x6000, 0x1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)=0x0) fchown(0xffffffffffffffff, r7, r8) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400}, 0xc, &(0x7f0000000580)=[{&(0x7f00000003c0)={0x11c, 0x2f, 0x10, 0x70bd2c, 0x25dfdbfb, "", [@generic="18ac9687e95d153b2171c15081f0c982240cc9063e450aec3da55aa325f7223c3d5ab00c3f2b26553fdfb6cb9b213eab19da9ca0919dc115876270e2d68cc930f1097f3c4ae43951ac7ab8664abbc49735ded35759f80df0b990e45a7c50a9a5533636fbdb0271e926e68594dbf2205683c83478e67b673f6fadd05ba5f4634debf085c291e8d474e4459452f9576f733113ca5f9c99", @nested={0x6f, 0x3f, 0x0, 0x1, [@typed={0x8, 0x26, 0x0, 0x0, @u32=0x6}, @generic="6b984e356a12a40a24191d6735ca81d558c85b141acafaf8519faefff077da2257a32b17328d13996f5ec07055fd4c", @typed={0x8, 0x1e, 0x0, 0x0, @uid=r4}, @typed={0x5, 0x3a, 0x0, 0x0, @str='\x00'}, @generic="ea5c8bfedfa971fae2ec16a8d71d9613b81479a32d8c7522a8a20ac6780091f58ac5aa8d"]}, @typed={0x4, 0x90}]}, 0x11c}, {&(0x7f0000000500)={0x38, 0x39, 0x400, 0x70bd2a, 0x25dfdbfd, "", [@generic, @nested={0x27, 0x8d, 0x0, 0x1, [@generic="e888c26073dec2e8c253daff98dac1", @typed={0x14, 0x51, 0x0, 0x0, @ipv6=@local}]}]}, 0x38}, {&(0x7f0000000540)={0x24, 0x22, 0x20, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x14, 0x57, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x24}], 0x3, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {r5, 0xee01, r6}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @rights={{0x20, 0x1, 0x1, [r1, r1, r0, r2]}}], 0x80, 0x20014040}, 0x1) 17:05:50 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000180)={0xbcde}) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200000, 0x0) sendmsg$AUDIT_USER(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb4, 0x3ed, 0x10, 0x70bd2c, 0x25dfdbff, "1345662acd5804a03e7b8fb3bf2594e9fabb7d4d522e3eb838a7a0a29069c353335034920d27e18950db64b0b3bd793f03b315eac7c7076dee3077f2b3694db03f3bafa7ab8ad0356592a36a0b5cfaeba2482a3881f9de058bb23187b0aa333167d4f24db056db146e05664b6af00412fde8f102dee226c680d33deeb3fd3219549ee58c5b451cae2b9fa5d1ab651ec3506e9f7e64c310af8ab5f23414e0bdbcc2ffd2b7", ["", "", "", ""]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000015}, 0x4000040) 17:05:50 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000840)={0xa0, 0x1, 0x8, 0x101, 0x0, 0x0, {0xa, 0x0, 0x2}, [@CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xfffffffa}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x101}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x80}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x3aa}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}]}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8}]}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0xd6}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x2}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8917}, @CTA_TIMEOUT_L4PROTO={0x5}]}, 0xa0}, 0x1, 0x0, 0x0, 0x48010}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) getsockname$llc(r0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000100)=0x10) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) ioctl$FS_IOC_GETFSLABEL(r4, 0x81009431, &(0x7f0000000140)) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x8, @fixed={[], 0x11}, 0x20}, 0xe) r7 = socket$inet(0x10, 0x2, 0x0) dup(r7) writev(r7, &(0x7f00000006c0)=[{&(0x7f00000007c0)="6f88a3e0e5dd698751875576273b89346af74302976a8be5837a81bcc8726f90f17af331964aa762d1dc904a07573da1da6ecb06147796ba873803776608cbaab39d4ece7404fbe14544543a", 0x4c}, {&(0x7f00000002c0)="312457f1084e70de43e15a637486153e5f2d15057f94c9d7298615845eb688446289d2e28b44d4f8c6063f94b4842f36dc70234f9feb66f58d44a3550b98632336862205f5c0fb61a7198415c1e5a9e70c21fab9a30c7bfb35204825b750087d7dc3bbbaa9e48e17d5f351c337825bdd2ad56ed6978dd5a56f7c7307ea73c54d9fb53bacd2ee22ba51ccab91c6837252a4e689", 0x93}, {&(0x7f0000000380)="f24aa662c0a553d53f71559cb5ff35605ced283241dd049ebf5ac3ad1ce2bf5751e06e39a1dc098a5a50e1ba8180f3cb29c93352e0a35d9896180aa5cc364384901ed2ade738bd898c619e30c5a351b2d85292a3f8a68f1ea9b3a3dc73f20eb93cbae95a7bf653f76bd85dcf8f72e9d03e3f2a04be62f7ca4ff7218b784d4cca8916a6c804ee7da2eeda8383a25e", 0x8e}, {&(0x7f0000000440)="24e0498a14d55470037227e9ad66afd9a79813b75cbe6e7a019d70b4fa6f78610c3cf3e3d392cb2a0884423e09d859e062cd239e269febef4f743fe5d9cd77f765d4e6a18121fc3c1c427cf31c5bc98321084effcfb81135d4604d7d7c17def119e497903220c89a4e49a8f4a5fbbb23280f653624222db035da18a6512464d86bf060a125", 0x85}, {&(0x7f0000000500)="feba9180a52e48afc996769af88d089664bf2c2a31bc838f5e5da9b7c57175439aabd2d3eb455c8401458f17ae157995b1fdf180e00610cb512deb8a8a806aa249ef615765050240041d73ed589d310a7c35e2f9c6605ebcb29db3cf6d20fd1bb747e6737057c73ac590b25a358a3353846219ce7be5b7556e9a214ac0b7ef127eccfe76d3f4c1abe7f6bcdad51c2d9211dde1f3efc2dd45932fd0162fc2c73924b53abf836f7474425281481ed5f35f5c2ddb3447574938", 0xb8}, {&(0x7f00000005c0)="8613adb42a4e7d8944656e964f21ece96b0038aa419ea5145e7e6030c24a2848e2b453e8481244", 0x27}, {&(0x7f0000000740)="677dd47f5e88ec9cca83ecd1d56caeea66f71cca42937af709cb14bc5769365e51f2f75d8bcd2952c4b91eb23e2aeb3f8fd8f87a4efd72c966663b80906e187156b8ce214c5d292f5012ff75d6271b825907494451b0af92a1c886cd133e8aee626a", 0x62}, {&(0x7f0000000640)="5ea0600d8c39865875c76736c1764c298abd6084bce73ad17ae9e6c1392e02c2be9229fedad1b0a23936c3e34fe67ea6d96817d6cdf120de3187cb3a97874d2c6ef85a72b4ee90dd5fbf", 0x4a}], 0x8) 17:05:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xf0ffffff, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x6, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 390.643639] batman_adv: batadv0: Interface activated: team0 17:05:50 executing program 2: r0 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000200)={r2, 0xffffffffffffffff, 0x3, 0xef, &(0x7f0000000100)="84889ca84a7d63f710fe1e60f19b0c8e712c69ee40719d93c395c1c670437aa9f326aba12d704652b9e712a3b58199424a9fc153c67875b8cd2b0bdaaf80902b870f295aff3e81bcca25a0b7d988a16c378bb644babd502ff05fba76b5e30abbcdd0e1e41b87d04e349e156132d94a03a03087dcf8b3bb50012a9452178c69518a38a6ef657aaf5c1608fa554c646f1468f4bf17da9708d08e84469818ad86c961dee6a3b59da5639bab7f818622da3bfe440ec587f48383df724dc2369e80abfbf05a09fed999fb5ed0002919deef2163dad4c4d4ccc4b9b25d4e32ebcb5e339c6066dd7e48f89417958b67549776", 0x1, 0x6, 0x5, 0x4, 0x7, 0x1, 0x1, 'syz0\x00'}) socket$phonet(0x23, 0x2, 0x1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/video1\x00', 0x2, 0x0) fcntl$setown(r3, 0x8, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x6000, 0x1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)=0x0) fchown(0xffffffffffffffff, r7, r8) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400}, 0xc, &(0x7f0000000580)=[{&(0x7f00000003c0)={0x11c, 0x2f, 0x10, 0x70bd2c, 0x25dfdbfb, "", [@generic="18ac9687e95d153b2171c15081f0c982240cc9063e450aec3da55aa325f7223c3d5ab00c3f2b26553fdfb6cb9b213eab19da9ca0919dc115876270e2d68cc930f1097f3c4ae43951ac7ab8664abbc49735ded35759f80df0b990e45a7c50a9a5533636fbdb0271e926e68594dbf2205683c83478e67b673f6fadd05ba5f4634debf085c291e8d474e4459452f9576f733113ca5f9c99", @nested={0x6f, 0x3f, 0x0, 0x1, [@typed={0x8, 0x26, 0x0, 0x0, @u32=0x6}, @generic="6b984e356a12a40a24191d6735ca81d558c85b141acafaf8519faefff077da2257a32b17328d13996f5ec07055fd4c", @typed={0x8, 0x1e, 0x0, 0x0, @uid=r4}, @typed={0x5, 0x3a, 0x0, 0x0, @str='\x00'}, @generic="ea5c8bfedfa971fae2ec16a8d71d9613b81479a32d8c7522a8a20ac6780091f58ac5aa8d"]}, @typed={0x4, 0x90}]}, 0x11c}, {&(0x7f0000000500)={0x38, 0x39, 0x400, 0x70bd2a, 0x25dfdbfd, "", [@generic, @nested={0x27, 0x8d, 0x0, 0x1, [@generic="e888c26073dec2e8c253daff98dac1", @typed={0x14, 0x51, 0x0, 0x0, @ipv6=@local}]}]}, 0x38}, {&(0x7f0000000540)={0x24, 0x22, 0x20, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x14, 0x57, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x24}], 0x3, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {r5, 0xee01, r6}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @rights={{0x20, 0x1, 0x1, [r1, r1, r0, r2]}}], 0x80, 0x20014040}, 0x1) [ 390.769505] batman_adv: batadv0: Interface deactivated: team0 17:05:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xf5ffffff, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 390.816779] batman_adv: batadv0: Removing interface: team0 17:05:51 executing program 2: r0 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000200)={r2, 0xffffffffffffffff, 0x3, 0xef, &(0x7f0000000100)="84889ca84a7d63f710fe1e60f19b0c8e712c69ee40719d93c395c1c670437aa9f326aba12d704652b9e712a3b58199424a9fc153c67875b8cd2b0bdaaf80902b870f295aff3e81bcca25a0b7d988a16c378bb644babd502ff05fba76b5e30abbcdd0e1e41b87d04e349e156132d94a03a03087dcf8b3bb50012a9452178c69518a38a6ef657aaf5c1608fa554c646f1468f4bf17da9708d08e84469818ad86c961dee6a3b59da5639bab7f818622da3bfe440ec587f48383df724dc2369e80abfbf05a09fed999fb5ed0002919deef2163dad4c4d4ccc4b9b25d4e32ebcb5e339c6066dd7e48f89417958b67549776", 0x1, 0x6, 0x5, 0x4, 0x7, 0x1, 0x1, 'syz0\x00'}) socket$phonet(0x23, 0x2, 0x1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/video1\x00', 0x2, 0x0) fcntl$setown(r3, 0x8, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x6000, 0x1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)=0x0) fchown(0xffffffffffffffff, r7, r8) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400}, 0xc, &(0x7f0000000580)=[{&(0x7f00000003c0)={0x11c, 0x2f, 0x10, 0x70bd2c, 0x25dfdbfb, "", [@generic="18ac9687e95d153b2171c15081f0c982240cc9063e450aec3da55aa325f7223c3d5ab00c3f2b26553fdfb6cb9b213eab19da9ca0919dc115876270e2d68cc930f1097f3c4ae43951ac7ab8664abbc49735ded35759f80df0b990e45a7c50a9a5533636fbdb0271e926e68594dbf2205683c83478e67b673f6fadd05ba5f4634debf085c291e8d474e4459452f9576f733113ca5f9c99", @nested={0x6f, 0x3f, 0x0, 0x1, [@typed={0x8, 0x26, 0x0, 0x0, @u32=0x6}, @generic="6b984e356a12a40a24191d6735ca81d558c85b141acafaf8519faefff077da2257a32b17328d13996f5ec07055fd4c", @typed={0x8, 0x1e, 0x0, 0x0, @uid=r4}, @typed={0x5, 0x3a, 0x0, 0x0, @str='\x00'}, @generic="ea5c8bfedfa971fae2ec16a8d71d9613b81479a32d8c7522a8a20ac6780091f58ac5aa8d"]}, @typed={0x4, 0x90}]}, 0x11c}, {&(0x7f0000000500)={0x38, 0x39, 0x400, 0x70bd2a, 0x25dfdbfd, "", [@generic, @nested={0x27, 0x8d, 0x0, 0x1, [@generic="e888c26073dec2e8c253daff98dac1", @typed={0x14, 0x51, 0x0, 0x0, @ipv6=@local}]}]}, 0x38}, {&(0x7f0000000540)={0x24, 0x22, 0x20, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x14, 0x57, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x24}], 0x3, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {r5, 0xee01, r6}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @rights={{0x20, 0x1, 0x1, [r1, r1, r0, r2]}}], 0x80, 0x20014040}, 0x1) 17:05:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 390.861860] team0: Cannot enslave team device to itself 17:05:51 executing program 5: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x2c, 0x4, 0xa, 0x5, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) clock_getres(0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x441, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x6b) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000040)={0x3, 0x6814, 0x401b, 0x10001, 0xffff, 0x2}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 390.902639] validate_nla: 15 callbacks suppressed [ 390.902648] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xfcffffff, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:51 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000180)={0xbcde}) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200000, 0x0) 17:05:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 390.975706] batman_adv: batadv0: Adding interface: team0 [ 390.996161] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:51 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x0, 0x70, 0xce, 0x0, 0x0, 0x1, 0x0, 0xfff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xfffff000, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 391.147283] batman_adv: batadv0: Interface activated: team0 [ 391.187366] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 391.203252] batman_adv: batadv0: Interface deactivated: team0 [ 391.238202] batman_adv: batadv0: Removing interface: team0 [ 391.274587] team0: Cannot enslave team device to itself [ 391.307468] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 391.324372] batman_adv: batadv0: Adding interface: team0 [ 391.349352] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 391.399131] batman_adv: batadv0: Interface activated: team0 [ 391.412901] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 391.427509] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x7, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:51 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xffffff7f, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:51 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000180)={0xbcde}) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200000, 0x0) 17:05:51 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000180)={0xbcde}) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200000, 0x0) [ 391.546844] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:51 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x7}, 0x800, 0xfffffffffffffffe, 0x0, 0x3, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000140)={0x0, 0x4, 0x1, 0x400, r1}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r1, 0xc01064c7, &(0x7f0000000100)={0x3, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0]}) [ 391.602562] batman_adv: batadv0: Interface deactivated: team0 17:05:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xffffff9e, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 391.649843] batman_adv: batadv0: Removing interface: team0 17:05:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) [ 391.697243] team0: Cannot enslave team device to itself 17:05:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xfffffff0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 391.755477] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 391.781569] batman_adv: batadv0: Adding interface: team0 17:05:52 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0xc02040, 0x0) mmap$fb(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1800004, 0x20010, r0, 0x28000) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) [ 391.816088] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xfffffff5, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 391.909089] batman_adv: batadv0: Interface activated: team0 17:05:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:52 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) syz_emit_vhci(&(0x7f00000003c0)=@HCI_SCODATA_PKT={0x3, {0xc8, 0x1f}, "9411cee024d427f223dff885708864dc416a082ccf05f1c28697c7c4a3ca30"}, 0x23) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x1, 0xa01, 0x100, 0x4, 0x1ff, 0x1, 0x9, 0x6c], 0x9, 0x0, 0x0, 0xffffffffffffffff}) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000180)={0x7, 0x1000, 0x800, 0x5, 0xb, "4cde18d97ca7c2ec3d9f248872ecca15bb58ff"}) socket$xdp(0x2c, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendmsg$nl_generic(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x110, 0x2b, 0x200, 0x70bd2b, 0x25dfdbfd, {0x13}, [@typed={0x14, 0x3f, 0x0, 0x0, @ipv6=@mcast2}, @generic="7511310e27c81ceff266908ec04fab3242afdc172d9f76f4eb6c936ca1fe1ad64428dc91d0de8fa1028637d30b3335916ec9ed30eeb290a184e7ae594ee96ee5673fd8af61ee8ecedd11c7d847745d9e05fc18d64fe12ed9a7300fd8ad1ba7293de76eef9155ca0b79e45b425f6db983a29279f634a75d220a5791a5d4bd9fcc0e81a1dd40a3b09af1bd15a60db473df46b8dbf839b14ded40ffa2a23c64f7b557d8f6cddebfa6c9accc6bdcd77876b8c696fa1ce1ef30dfcc61105c308b7f478a86fdce87b602af6e0d4e58aff6197d3b18794423e35f60be930ffc086c18136c5cb5c58053b6cc"]}, 0x110}, 0x1, 0x0, 0x0, 0x4081}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x3) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000040)={0x3, 0xba80, "f628e3", 0x20, 0x50}) [ 391.984445] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 392.005725] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:52 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000180)={0xbcde}) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) 17:05:52 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000180)={0xbcde}) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200000, 0x0) 17:05:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xfffffffc, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 392.140400] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) [ 392.182004] batman_adv: batadv0: Interface deactivated: team0 17:05:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xffffffff, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 392.226417] batman_adv: batadv0: Removing interface: team0 17:05:52 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) [ 392.266623] team0: Cannot enslave team device to itself [ 392.300135] batman_adv: batadv0: Adding interface: team0 17:05:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0xf, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 392.305637] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:52 executing program 5: r0 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x8) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x34200, 0x0) 17:05:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0xc0, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 392.436655] batman_adv: batadv0: Interface activated: team0 [ 392.483119] batman_adv: batadv0: Interface deactivated: team0 [ 392.493719] batman_adv: batadv0: Removing interface: team0 [ 392.527740] team0: Cannot enslave team device to itself [ 392.565306] batman_adv: batadv0: Adding interface: team0 [ 392.574353] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 392.657736] batman_adv: batadv0: Interface activated: team0 17:05:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xa, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:52 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000180)={0xbcde}) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200000, 0x0) 17:05:52 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, 0x0, 0x0, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:52 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) dup(r1) setsockopt$inet_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000100)="ea93f76496f94e63cc9fd1ec20d31e81e0179bd9d0b452e771f53ba7d1fd20a005c6e1b3ce2372ef483734befb3ca7d0e94515dbcdc135bd849725ba5f4580f3fd365089958fac4996b2cae3f6d3bec5ce3421378c347ddff35ca25d48dacd9c05f826aa4afe62d7c1cd6a9a32f6ec957a0e3bf49a68b13a160f6f5a33bf9ce313466e3b6aa6640f560cf622ed8313b75153101f06e5e63d26d7f896762c66e230c9b05d264ec3248f76b7d68e61", 0xae) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0xec0, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x33fe0, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, 0x0, 0x0, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 392.818621] batman_adv: batadv0: Interface deactivated: team0 [ 392.856397] batman_adv: batadv0: Removing interface: team0 17:05:53 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_mr_cache\x00') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, r2, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "eac5bdcc9d21a260360b3513a7b489e104df0c37357bf2e4c9b8f783"}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) 17:05:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x200000dc, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 392.915434] team0: Cannot enslave team device to itself [ 392.932691] batman_adv: batadv0: Adding interface: team0 [ 392.938280] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 392.997716] batman_adv: batadv0: Interface activated: team0 [ 393.051398] batman_adv: batadv0: Interface deactivated: team0 [ 393.057500] batman_adv: batadv0: Removing interface: team0 17:05:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:53 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 393.130230] team0: Cannot enslave team device to itself [ 393.167304] batman_adv: batadv0: Adding interface: team0 [ 393.179509] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 393.227590] batman_adv: batadv0: Interface activated: team0 [ 393.238149] batman_adv: batadv0: Interface deactivated: team0 [ 393.274440] batman_adv: batadv0: Removing interface: team0 [ 393.303774] team0: Cannot enslave team device to itself 17:05:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xc, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x7ffff000, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, 0x0, 0x0, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000000100)={0xc0000000, 0x101, "9de89636b53996e97e24b12174b00c5b5df1909e88a69511075706f889402297", 0x3, 0x100000001, 0x7f, 0x9d, 0x81, 0xfffffffe, 0x1, 0x5, [0x0, 0x7, 0x7f, 0x1]}) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x100010, 0xffffffffffffffff, 0x2f935000) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) r7 = socket$inet6_sctp(0xa, 0x0, 0x84) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r7, 0x84, 0x83, &(0x7f0000000000)={r9}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000200)={r9, @in6={{0xa, 0x4e24, 0x1, @empty, 0x9}}, 0x3, 0x2, 0x4, 0x0, 0x0, 0xd7f, 0x20}, &(0x7f00000002c0)=0x9c) setitimer(0x2, &(0x7f0000000340)={{0x77359400}}, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)) [ 393.320700] batman_adv: batadv0: Adding interface: team0 [ 393.326222] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0xfffffdef, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 393.448542] batman_adv: batadv0: Interface activated: team0 [ 393.472027] batman_adv: batadv0: Interface deactivated: team0 [ 393.479257] batman_adv: batadv0: Removing interface: team0 17:05:53 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}], 0x1, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 393.530249] team0: Cannot enslave team device to itself [ 393.567819] batman_adv: batadv0: Adding interface: team0 [ 393.585506] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xa, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x0, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:53 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='rpc_clnt_new\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 393.687181] batman_adv: batadv0: Interface activated: team0 17:05:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0xe, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}], 0x1, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 393.727644] batman_adv: batadv0: Interface deactivated: team0 [ 393.762520] batman_adv: batadv0: Removing interface: team0 [ 393.816823] team0: Cannot enslave team device to itself [ 393.832663] batman_adv: batadv0: Adding interface: team0 [ 393.838160] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 393.868473] batman_adv: batadv0: Interface activated: team0 [ 393.876605] batman_adv: batadv0: Interface deactivated: team0 [ 393.886510] batman_adv: batadv0: Removing interface: team0 17:05:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xe, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:54 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0xb, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x3, 0x6, 0x801, 0x0, 0x0, {0x1, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)) [ 393.916637] team0: Cannot enslave team device to itself [ 393.927738] batman_adv: batadv0: Adding interface: team0 [ 393.944241] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x4, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:54 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x408100, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r1}) 17:05:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}], 0x1, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 394.043413] batman_adv: batadv0: Interface activated: team0 [ 394.069957] batman_adv: batadv0: Interface deactivated: team0 [ 394.075971] batman_adv: batadv0: Removing interface: team0 17:05:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xc, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x202, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 394.121327] team0: Cannot enslave team device to itself [ 394.134714] batman_adv: batadv0: Adding interface: team0 [ 394.141558] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 394.194980] batman_adv: batadv0: Interface activated: team0 [ 394.232280] batman_adv: batadv0: Interface deactivated: team0 17:05:54 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:54 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x205, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 394.251086] batman_adv: batadv0: Removing interface: team0 [ 394.281721] team0: Cannot enslave team device to itself 17:05:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 394.316467] batman_adv: batadv0: Adding interface: team0 [ 394.333993] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x206, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:54 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0x2, 0x4) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000004, 0x30, r0, 0x44cad000) [ 394.440527] batman_adv: batadv0: Interface activated: team0 [ 394.479881] batman_adv: batadv0: Interface deactivated: team0 17:05:54 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 394.485862] batman_adv: batadv0: Removing interface: team0 17:05:54 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x408100, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r1}) 17:05:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x208, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 394.543189] team0: Cannot enslave team device to itself [ 394.565630] batman_adv: batadv0: Adding interface: team0 17:05:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:54 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) munlockall() getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000080)=0x8) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x100, 0x0) [ 394.576462] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x209, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:54 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 394.678063] batman_adv: batadv0: Interface activated: team0 17:05:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x20a, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x48, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:54 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:55 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x240403, 0x0) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x1, 0x1, 0x6, 0x3, 0x8, "acef2e3ea8be1d204c212a957558e2dd6f904c9e13370a8d8bf59f4caa04e27cb2b33a0d0375f9224e241a681ca11320e2b5d3c9136b9099bd3ed2ac709258", 0x34}, 0x60) 17:05:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x20b, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 394.819611] batman_adv: batadv0: Interface deactivated: team0 [ 394.841674] batman_adv: batadv0: Removing interface: team0 17:05:55 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) write$binfmt_script(r1, &(0x7f0000000100)={'#! ', './file0', [{0x20, '\xcf'}, {0x20, '/dev/dri/card#\x00'}], 0xa, "0fe19aff4131e14be7d2528803f558f26fa1061c3ef83995cf106873f5ef65b201faea246cca0822f917"}, 0x47) [ 394.889063] team0: Cannot enslave team device to itself [ 394.901974] batman_adv: batadv0: Adding interface: team0 [ 394.907471] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x210, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 394.984040] batman_adv: batadv0: Interface activated: team0 17:05:55 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:55 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:55 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 395.032852] batman_adv: batadv0: Interface deactivated: team0 [ 395.040760] batman_adv: batadv0: Removing interface: team0 [ 395.087374] team0: Cannot enslave team device to itself 17:05:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 395.132061] batman_adv: batadv0: Adding interface: team0 [ 395.137570] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 395.237193] batman_adv: batadv0: Interface activated: team0 17:05:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x2, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:55 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) alarm(0x7) 17:05:55 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="000400000d14610029bd7000fcdbdf2508003e00010000000800e1a939ce51f5"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:55 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x4c, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x3, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 395.396698] batman_adv: batadv0: Interface deactivated: team0 17:05:55 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext, 0x52221, 0x200000, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/packet\x00') r1 = socket$inet(0x10, 0x2, 0x0) dup(r1) r2 = accept$ax25(r0, &(0x7f0000000200)={{0x3, @netrom}, [@remote, @default, @bcast, @default, @remote, @rose, @default, @rose]}, &(0x7f0000000280)=0x48) sendfile(r2, r0, &(0x7f00000002c0)=0x103000, 0x3468) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) ioctl$IOCTL_VMCI_CTX_ADD_NOTIFICATION(0xffffffffffffffff, 0x7af, &(0x7f0000000040)={@local, 0x9}) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000140)="4c65c17ac7ceacdccd5df5442236f6193fc8370aaef29ac5fc78c408893aa959e512fef97ce9983eca42063323874f63ae48929298c525fb541694a353292ae3378bfdbc309b366d414ad54d4e156f1d13a454ab8d1229e0ed2911169f6fe3e8fbee98b69c9a97f61d282d4e6f9afc508b68fc44549d9575f678f8880eca18b57d311ec74f21ca8838acac3b688e2bd1199488d6ca1a106d", 0x98) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x224801, 0x0) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) dup3(r3, r4, 0x80000) r5 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xfffffffffffffffd, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r7 = socket$inet(0x10, 0x2, 0x0) r8 = dup(r7) sendfile(r8, r6, &(0x7f0000000040)=0x103000, 0x8001) linkat(r6, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file0\x00', 0xc00) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f00000000c0)) [ 395.444148] batman_adv: batadv0: Removing interface: team0 17:05:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x4, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 395.485000] team0: Cannot enslave team device to itself 17:05:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x7, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:55 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:55 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) munlockall() getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000080)=0x8) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x100, 0x0) [ 395.531768] batman_adv: batadv0: Adding interface: team0 [ 395.537815] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:55 executing program 5: r0 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = dup(0xffffffffffffffff) sendfile(r3, r2, &(0x7f0000000040)=0x103000, 0x8001) write$tcp_congestion(r2, &(0x7f0000000100)='cubic\x00', 0x6) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x25a}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8088}, 0x4008004) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000080)=0xe511) 17:05:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x8, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 395.659898] batman_adv: batadv0: Interface activated: team0 [ 395.693252] batman_adv: batadv0: Interface deactivated: team0 [ 395.700087] batman_adv: batadv0: Removing interface: team0 [ 395.737715] team0: Cannot enslave team device to itself [ 395.765838] batman_adv: batadv0: Adding interface: team0 [ 395.773386] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 395.809031] batman_adv: batadv0: Interface activated: team0 17:05:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xe, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:56 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x7}, 0x800, 0xfffffffffffffffe, 0x0, 0x3, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000140)={0x0, 0x4, 0x1, 0x400, r1}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r1, 0xc01064c7, &(0x7f0000000100)={0x3, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0]}) 17:05:56 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000040)={0x9, 0xdf80, 0x2, 0x4}, 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:56 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x60, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 395.907024] batman_adv: batadv0: Interface deactivated: team0 [ 395.939131] batman_adv: batadv0: Removing interface: team0 17:05:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xf, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:56 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4280}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 395.978647] team0: Cannot enslave team device to itself [ 396.017580] validate_nla: 34 callbacks suppressed 17:05:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:56 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x7}, 0x800, 0xfffffffffffffffe, 0x0, 0x3, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000140)={0x0, 0x4, 0x1, 0x400, r1}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r1, 0xc01064c7, &(0x7f0000000100)={0x3, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0]}) [ 396.017589] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x60, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 396.066802] batman_adv: batadv0: Adding interface: team0 [ 396.085556] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:56 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000100), &(0x7f0000000080)=0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_SET(r1, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)={0x1c4, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x80000000}, {0x6, 0x11, 0x9}, {0x8, 0x13, 0x2}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x6}, {0x8, 0x13, 0x6}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x3b09}, {0x6, 0x11, 0x3}, {0x8, 0x13, 0xa9}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x80000000}, {0x6, 0x11, 0x401}, {0x8, 0x13, 0x9}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0xfffff001}, {0x6, 0x11, 0x4eb}, {0x8, 0x13, 0x8}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2}, {0x6, 0x11, 0xfffa}, {0x8, 0x13, 0x2}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x2}, {0x6, 0x11, 0x179b}, {0x8, 0x13, 0x20}, {0x5, 0x14, 0x1}}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x4c141}, 0x80804) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) newfstatat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)=0x0) fchown(0xffffffffffffffff, r6, r7) mount$fuse(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x80, &(0x7f0000000580)=ANY=[@ANYBLOB="100020", @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB=',max_read=0x0000000000000007,max_read=0x0000000000000008,allow_other,max_read=0x0000000000000003,max_read=0x0000000000000004,default_permissions,default_permissions,allow_other,subj_type=-$,permit_directio,subj_role=/dev/dri/card#\x00,euid<', @ANYRESDEC=r6, @ANYBLOB="06215e2b242c7375626a5f726f6c653d302e30002c00"/33]) r8 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r8, 0xc00c642e, &(0x7f00000000c0)) r9 = syz_open_dev$radio(&(0x7f0000000740)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_DECODER_CMD(r9, 0xc0485660, &(0x7f0000000780)={0x1, 0x1, @start={0x2, 0x1}}) 17:05:56 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x7}, 0x800, 0xfffffffffffffffe, 0x0, 0x3, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000140)={0x0, 0x4, 0x1, 0x400, r1}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r1, 0xc01064c7, &(0x7f0000000100)={0x3, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0]}) 17:05:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xe0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 396.227487] batman_adv: batadv0: Interface activated: team0 [ 396.261705] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:56 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 396.279625] batman_adv: batadv0: Interface deactivated: team0 [ 396.315870] batman_adv: batadv0: Removing interface: team0 [ 396.357166] team0: Cannot enslave team device to itself [ 396.374664] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 396.394456] batman_adv: batadv0: Adding interface: team0 17:05:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x68, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xf0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x4c, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:56 executing program 5: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) r3 = openat$incfs(r2, &(0x7f0000000100)='.log\x00', 0x40480, 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r2}) [ 396.412376] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 396.442202] batman_adv: batadv0: Interface activated: team0 17:05:56 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) socket$can_raw(0x1d, 0x3, 0x1) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 396.511163] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 396.544665] batman_adv: batadv0: Interface deactivated: team0 17:05:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x300, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:56 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000100)={0x5, 0x1, 0x1}) [ 396.574967] batman_adv: batadv0: Removing interface: team0 [ 396.603881] team0: Cannot enslave team device to itself [ 396.617844] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x700, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 396.630431] batman_adv: batadv0: Interface deactivated: team0 [ 396.665083] batman_adv: batadv0: Removing interface: team0 17:05:56 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0xf8a7fff, 0x980, 0x10001, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a090c, 0xa9800000, [], @p_u32=&(0x7f0000000040)=0x9e3}}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 396.688339] team0: Cannot enslave team device to itself [ 396.707291] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 396.737347] batman_adv: batadv0: Adding interface: team0 17:05:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xe00, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 396.765354] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 396.802430] batman_adv: batadv0: Interface activated: team0 [ 396.814515] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 396.841118] batman_adv: batadv0: Adding interface: team0 17:05:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 396.856660] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 396.921917] batman_adv: batadv0: Interface activated: team0 [ 396.954572] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x6c, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:57 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = socket$inet(0x10, 0x2, 0x0) dup(r1) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x5, 0x4) 17:05:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xf00, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:57 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r1, 0x4, 0x400) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x4c, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x1, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 396.976523] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:05:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x6000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 397.085006] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 17:05:57 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r1, 0xc0884123, &(0x7f0000000840)={0x6, "cd648c50180f86e3f51cbdf94f89774c435d6424333e54d074ddd0576aa23ffb9e8c6faf7263ba01fbaf444d9c0448cb286dfce820f7c6c8c2a901a926fafa57", {0x4, 0x6}}) socket$inet(0x10, 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={r2}) kexec_load(0xc3, 0x8, &(0x7f00000005c0)=[{&(0x7f0000000100)="6ad7e76a85f1205b51cb0aa11af9d4ab87990e485dde2f33f1c53effeaba7f57d23f920ef57cc9709b08586c3e0e41130d85f79895c407d0ce3cfd57a7ec1b8914f5ec1aecadb4b62f8875699caf7ca497385a617e5fc060cb330cd6217ce092d2826fe6ac1c5e0f656d920176694c6291497c0f229c1c289351102cb7f12c39379a45331704e02da51e0b49fddf350b233a33cf", 0x94, 0x1, 0x4}, {&(0x7f00000001c0)="6eca3da04bb38ed71e5d4ba9a189255de0ab8389854ee4b3b9dc8fa909b3fccd5659eb6b607258af3b058df7737738b081524be039eeaf780431afa6f14c7e6f7aece2dfc228e143a24dc9ec6b4c41f5b8fa707c863ebe544758dde662ea01ac54797958c60678fab88547b43dcba75ebf230ac85a13587bdbeb9fc881ce9b2cf02e045a308885a6c7bfb8572709cf1b26bdec39bd0eddcf647a9b9bfb54586d0e2d3a6be9c464580db0584d0033c7a3db33a5835f2adecd121c9285426480c9366a17499405211110d21cdc77efbb52117da8a700c55763d175398221de428dba0fa9b02a70bc0c811613f0", 0xec, 0xbc, 0x3ff}, {&(0x7f00000002c0)="e26a", 0x2, 0x8, 0x4}, {&(0x7f0000000300)="e85e9a2be0fd36ebfadc1395a242d848a31f7b497c19950f8ef9ab5910e66e7b6e", 0x21, 0x7fff, 0x3f}, {&(0x7f0000000340)="6698444b81312ae79b9f156145456fbbaee93e0e8cf0283a66e7a43f60dcbcd2e1b64d92740297ac884172bdd70777c3269ea986080fa66003c6ed5f7b665446c672da44973d5edfdfa86b5158938d51f7560b567de41128e52e5892e7ecad30bac3740445892f1cc80f78ec29c9b37e23c676c136d647d97bc10290cbe819260a187ad117959d9f8b46b897a4ba7ca9d7b3378c59eeeb1ad77ec7f679c7f6e7500fbcd65bcec2fae41f72247171615fbb3db348c434ecc88452a56eb8fa3ff909d8be000cafae6c2d7a255416e7a95b538388b25f0e8f1b8f41ecd01f0b", 0xde, 0xfff, 0x9}, {&(0x7f0000000440)="2ff4b1a846dba496e595deaade8b9d1c47763979c08c9a90c3e6b043b3a49166ba6c36b5fceaaf9623818d54651b6b92fa858df5012e48d7d4d1addc9704a387eff2efb3db302c5fef1c996078580ccaf80cbcba319fb547b23a05ddfdb9ef324dd2d4168f4c536a4ebccfeddf312a89a540070b9282a7fdfda3fc548c15c80d1abbc830507d83b0", 0x88, 0x100, 0x3ff}, {&(0x7f0000000500)="ad", 0xfffffeef, 0x1, 0xe4}, {&(0x7f00000006c0)="cdb89dbff45cc3950e12aafc355795747cb85bf51adb49dbd9f87efe6dbea60866e4e02beae8b8d05930334e41c6d956d9ae9c1ca1fbf6bfbe8e331d534ca96226bf33d4528a9fd3fd857ff5b4bc78e6091579bb1427b7c3d86c65ee354e46b83345fbd70100b65d5df2a4ec4cf397343f14d0e9ec92011b64c134d28cc93d0cabaede5fc873392932cb3757faac76dc08b1a9ee710366dade7b38290a716fbebe52643b4b6f7b3a5eb0b37c28909eeb7fe6b6897f468cceebafc3", 0xbb, 0x7, 0x5}], 0x140000) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r3, &(0x7f0000000000)=""/116, 0x74) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@private2}}, &(0x7f0000000ec0)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000940)='hfsplus\x00', &(0x7f0000000980)='./file0\x00', 0x9, 0x4, &(0x7f0000000c40)=[{&(0x7f00000009c0)="d7a9c7327e1e850d4f7629a385a5ffef077082597e2d32a1ff78d1e04330a295724de79f54ed0a6b7e91ec5fcb0c88a3cc2b70ac10f81bdf67ac4b3467cbee9c1a38c48300b4ec04cac5c19759d978fee888e7e456892a250dab3b3d1704b0aa82ea37f091565f98ba85ca692b067cbd8ae9cd4790e8d998104c", 0x7a}, {&(0x7f0000000a40)="02e53b995466c1ccd3c408cec7d2d141e7a436bc6a0a0e01cfdcd227a96fddf2bed7f54fecdab7", 0x27, 0xfc9}, {&(0x7f0000000a80)="d407accdea", 0x5, 0xffff}, {&(0x7f0000000ac0)="2effc9cf4a87eebd08bf07486260563a8cb5cdd18f541074c0ce678b77fd0d7bbcf1d89a2ed6b4afb9b157164fff014dcc91d19ca36f4b609608ea836c5558d21d6124c9a8178dae70c484dbfa5d8700b8a47698efd5a4a79c31cac43e18a3bf49a0065e88ddc52dd68a506016b3ec9ddf048c059402c2f912b964406eded7152b1287b0853f78fe7865d3eb214b515d6b4b4154c5db6d96ffede3419ece", 0x9e, 0x4}], 0x0, &(0x7f0000000f00)={[{@umask={'umask', 0x3d, 0x9}}, {@nobarrier='nobarrier'}, {@decompose='decompose'}, {@umask={'umask', 0x3d, 0x9}}, {@uid={'uid', 0x3d, r4}}, {@decompose='decompose'}, {@type={'type', 0x3d, "b513afc0"}}, {@force='force'}, {@nls={'nls', 0x3d, 'cp860'}}], [{@fsmagic={'fsmagic', 0x3d, 0xffffffff7fffffff}}, {@dont_measure='dont_measure'}, {@context={'context', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', 0xee00}}, {@euid_lt={'euid<', r5}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000540)='user\x00', &(0x7f0000000900)=@keyring={'key_or_keyring:'}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r6 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000800)='/dev/video1\x00', 0x2, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r6, 0x8010671f, &(0x7f0000000580)={&(0x7f0000000780)=""/98, 0x62}) [ 397.132294] batman_adv: batadv0: Interface deactivated: team0 [ 397.147543] batman_adv: batadv0: Removing interface: team0 17:05:57 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xe000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 397.200042] team0: Cannot enslave team device to itself [ 397.221628] batman_adv: batadv0: Interface deactivated: team0 [ 397.227911] batman_adv: batadv0: Removing interface: team0 [ 397.237428] hfsplus: unable to parse mount options [ 397.252847] team0: Cannot enslave team device to itself [ 397.259864] batman_adv: batadv0: Adding interface: team0 [ 397.265346] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x1, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:57 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 397.343796] batman_adv: batadv0: Interface activated: team0 [ 397.351723] batman_adv: batadv0: Adding interface: team0 [ 397.357210] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 397.383394] batman_adv: batadv0: Interface activated: team0 17:05:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xf000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:57 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:05:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x4c, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x1, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:57 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xf0ffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 397.529250] batman_adv: batadv0: Interface deactivated: team0 [ 397.575383] batman_adv: batadv0: Removing interface: team0 [ 397.602156] team0: Cannot enslave team device to itself 17:05:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x1000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 397.622147] batman_adv: batadv0: Interface deactivated: team0 [ 397.628198] batman_adv: batadv0: Removing interface: team0 [ 397.657944] team0: Cannot enslave team device to itself [ 397.688269] batman_adv: batadv0: Adding interface: team0 [ 397.695252] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:57 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x400) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x2000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 397.791465] batman_adv: batadv0: Interface activated: team0 [ 397.812768] batman_adv: batadv0: Adding interface: team0 17:05:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 397.839047] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x3000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 397.926637] batman_adv: batadv0: Interface activated: team0 [ 397.970822] batman_adv: batadv0: Interface deactivated: team0 [ 397.989397] batman_adv: batadv0: Removing interface: team0 [ 398.024804] team0: Cannot enslave team device to itself [ 398.046518] batman_adv: batadv0: Adding interface: team0 17:05:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x7a, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:58 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x400) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:58 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r1, 0xc0884123, &(0x7f0000000840)={0x6, "cd648c50180f86e3f51cbdf94f89774c435d6424333e54d074ddd0576aa23ffb9e8c6faf7263ba01fbaf444d9c0448cb286dfce820f7c6c8c2a901a926fafa57", {0x4, 0x6}}) socket$inet(0x10, 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={r2}) kexec_load(0xc3, 0x8, &(0x7f00000005c0)=[{&(0x7f0000000100)="6ad7e76a85f1205b51cb0aa11af9d4ab87990e485dde2f33f1c53effeaba7f57d23f920ef57cc9709b08586c3e0e41130d85f79895c407d0ce3cfd57a7ec1b8914f5ec1aecadb4b62f8875699caf7ca497385a617e5fc060cb330cd6217ce092d2826fe6ac1c5e0f656d920176694c6291497c0f229c1c289351102cb7f12c39379a45331704e02da51e0b49fddf350b233a33cf", 0x94, 0x1, 0x4}, {&(0x7f00000001c0)="6eca3da04bb38ed71e5d4ba9a189255de0ab8389854ee4b3b9dc8fa909b3fccd5659eb6b607258af3b058df7737738b081524be039eeaf780431afa6f14c7e6f7aece2dfc228e143a24dc9ec6b4c41f5b8fa707c863ebe544758dde662ea01ac54797958c60678fab88547b43dcba75ebf230ac85a13587bdbeb9fc881ce9b2cf02e045a308885a6c7bfb8572709cf1b26bdec39bd0eddcf647a9b9bfb54586d0e2d3a6be9c464580db0584d0033c7a3db33a5835f2adecd121c9285426480c9366a17499405211110d21cdc77efbb52117da8a700c55763d175398221de428dba0fa9b02a70bc0c811613f0", 0xec, 0xbc, 0x3ff}, {&(0x7f00000002c0)="e26a", 0x2, 0x8, 0x4}, {&(0x7f0000000300)="e85e9a2be0fd36ebfadc1395a242d848a31f7b497c19950f8ef9ab5910e66e7b6e", 0x21, 0x7fff, 0x3f}, {&(0x7f0000000340)="6698444b81312ae79b9f156145456fbbaee93e0e8cf0283a66e7a43f60dcbcd2e1b64d92740297ac884172bdd70777c3269ea986080fa66003c6ed5f7b665446c672da44973d5edfdfa86b5158938d51f7560b567de41128e52e5892e7ecad30bac3740445892f1cc80f78ec29c9b37e23c676c136d647d97bc10290cbe819260a187ad117959d9f8b46b897a4ba7ca9d7b3378c59eeeb1ad77ec7f679c7f6e7500fbcd65bcec2fae41f72247171615fbb3db348c434ecc88452a56eb8fa3ff909d8be000cafae6c2d7a255416e7a95b538388b25f0e8f1b8f41ecd01f0b", 0xde, 0xfff, 0x9}, {&(0x7f0000000440)="2ff4b1a846dba496e595deaade8b9d1c47763979c08c9a90c3e6b043b3a49166ba6c36b5fceaaf9623818d54651b6b92fa858df5012e48d7d4d1addc9704a387eff2efb3db302c5fef1c996078580ccaf80cbcba319fb547b23a05ddfdb9ef324dd2d4168f4c536a4ebccfeddf312a89a540070b9282a7fdfda3fc548c15c80d1abbc830507d83b0", 0x88, 0x100, 0x3ff}, {&(0x7f0000000500)="ad", 0xfffffeef, 0x1, 0xe4}, {&(0x7f00000006c0)="cdb89dbff45cc3950e12aafc355795747cb85bf51adb49dbd9f87efe6dbea60866e4e02beae8b8d05930334e41c6d956d9ae9c1ca1fbf6bfbe8e331d534ca96226bf33d4528a9fd3fd857ff5b4bc78e6091579bb1427b7c3d86c65ee354e46b83345fbd70100b65d5df2a4ec4cf397343f14d0e9ec92011b64c134d28cc93d0cabaede5fc873392932cb3757faac76dc08b1a9ee710366dade7b38290a716fbebe52643b4b6f7b3a5eb0b37c28909eeb7fe6b6897f468cceebafc3", 0xbb, 0x7, 0x5}], 0x140000) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r3, &(0x7f0000000000)=""/116, 0x74) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@private2}}, &(0x7f0000000ec0)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000940)='hfsplus\x00', &(0x7f0000000980)='./file0\x00', 0x9, 0x4, &(0x7f0000000c40)=[{&(0x7f00000009c0)="d7a9c7327e1e850d4f7629a385a5ffef077082597e2d32a1ff78d1e04330a295724de79f54ed0a6b7e91ec5fcb0c88a3cc2b70ac10f81bdf67ac4b3467cbee9c1a38c48300b4ec04cac5c19759d978fee888e7e456892a250dab3b3d1704b0aa82ea37f091565f98ba85ca692b067cbd8ae9cd4790e8d998104c", 0x7a}, {&(0x7f0000000a40)="02e53b995466c1ccd3c408cec7d2d141e7a436bc6a0a0e01cfdcd227a96fddf2bed7f54fecdab7", 0x27, 0xfc9}, {&(0x7f0000000a80)="d407accdea", 0x5, 0xffff}, {&(0x7f0000000ac0)="2effc9cf4a87eebd08bf07486260563a8cb5cdd18f541074c0ce678b77fd0d7bbcf1d89a2ed6b4afb9b157164fff014dcc91d19ca36f4b609608ea836c5558d21d6124c9a8178dae70c484dbfa5d8700b8a47698efd5a4a79c31cac43e18a3bf49a0065e88ddc52dd68a506016b3ec9ddf048c059402c2f912b964406eded7152b1287b0853f78fe7865d3eb214b515d6b4b4154c5db6d96ffede3419ece", 0x9e, 0x4}], 0x0, &(0x7f0000000f00)={[{@umask={'umask', 0x3d, 0x9}}, {@nobarrier='nobarrier'}, {@decompose='decompose'}, {@umask={'umask', 0x3d, 0x9}}, {@uid={'uid', 0x3d, r4}}, {@decompose='decompose'}, {@type={'type', 0x3d, "b513afc0"}}, {@force='force'}, {@nls={'nls', 0x3d, 'cp860'}}], [{@fsmagic={'fsmagic', 0x3d, 0xffffffff7fffffff}}, {@dont_measure='dont_measure'}, {@context={'context', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', 0xee00}}, {@euid_lt={'euid<', r5}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000540)='user\x00', &(0x7f0000000900)=@keyring={'key_or_keyring:'}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r6 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000800)='/dev/video1\x00', 0x2, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r6, 0x8010671f, &(0x7f0000000580)={&(0x7f0000000780)=""/98, 0x62}) 17:05:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x4000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 398.053839] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 398.094807] batman_adv: batadv0: Interface activated: team0 17:05:58 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x400) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 398.195143] batman_adv: batadv0: Interface deactivated: team0 17:05:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x7000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:58 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r1, 0xc0884123, &(0x7f0000000840)={0x6, "cd648c50180f86e3f51cbdf94f89774c435d6424333e54d074ddd0576aa23ffb9e8c6faf7263ba01fbaf444d9c0448cb286dfce820f7c6c8c2a901a926fafa57", {0x4, 0x6}}) socket$inet(0x10, 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={r2}) kexec_load(0xc3, 0x8, &(0x7f00000005c0)=[{&(0x7f0000000100)="6ad7e76a85f1205b51cb0aa11af9d4ab87990e485dde2f33f1c53effeaba7f57d23f920ef57cc9709b08586c3e0e41130d85f79895c407d0ce3cfd57a7ec1b8914f5ec1aecadb4b62f8875699caf7ca497385a617e5fc060cb330cd6217ce092d2826fe6ac1c5e0f656d920176694c6291497c0f229c1c289351102cb7f12c39379a45331704e02da51e0b49fddf350b233a33cf", 0x94, 0x1, 0x4}, {&(0x7f00000001c0)="6eca3da04bb38ed71e5d4ba9a189255de0ab8389854ee4b3b9dc8fa909b3fccd5659eb6b607258af3b058df7737738b081524be039eeaf780431afa6f14c7e6f7aece2dfc228e143a24dc9ec6b4c41f5b8fa707c863ebe544758dde662ea01ac54797958c60678fab88547b43dcba75ebf230ac85a13587bdbeb9fc881ce9b2cf02e045a308885a6c7bfb8572709cf1b26bdec39bd0eddcf647a9b9bfb54586d0e2d3a6be9c464580db0584d0033c7a3db33a5835f2adecd121c9285426480c9366a17499405211110d21cdc77efbb52117da8a700c55763d175398221de428dba0fa9b02a70bc0c811613f0", 0xec, 0xbc, 0x3ff}, {&(0x7f00000002c0)="e26a", 0x2, 0x8, 0x4}, {&(0x7f0000000300)="e85e9a2be0fd36ebfadc1395a242d848a31f7b497c19950f8ef9ab5910e66e7b6e", 0x21, 0x7fff, 0x3f}, {&(0x7f0000000340)="6698444b81312ae79b9f156145456fbbaee93e0e8cf0283a66e7a43f60dcbcd2e1b64d92740297ac884172bdd70777c3269ea986080fa66003c6ed5f7b665446c672da44973d5edfdfa86b5158938d51f7560b567de41128e52e5892e7ecad30bac3740445892f1cc80f78ec29c9b37e23c676c136d647d97bc10290cbe819260a187ad117959d9f8b46b897a4ba7ca9d7b3378c59eeeb1ad77ec7f679c7f6e7500fbcd65bcec2fae41f72247171615fbb3db348c434ecc88452a56eb8fa3ff909d8be000cafae6c2d7a255416e7a95b538388b25f0e8f1b8f41ecd01f0b", 0xde, 0xfff, 0x9}, {&(0x7f0000000440)="2ff4b1a846dba496e595deaade8b9d1c47763979c08c9a90c3e6b043b3a49166ba6c36b5fceaaf9623818d54651b6b92fa858df5012e48d7d4d1addc9704a387eff2efb3db302c5fef1c996078580ccaf80cbcba319fb547b23a05ddfdb9ef324dd2d4168f4c536a4ebccfeddf312a89a540070b9282a7fdfda3fc548c15c80d1abbc830507d83b0", 0x88, 0x100, 0x3ff}, {&(0x7f0000000500)="ad", 0xfffffeef, 0x1, 0xe4}, {&(0x7f00000006c0)="cdb89dbff45cc3950e12aafc355795747cb85bf51adb49dbd9f87efe6dbea60866e4e02beae8b8d05930334e41c6d956d9ae9c1ca1fbf6bfbe8e331d534ca96226bf33d4528a9fd3fd857ff5b4bc78e6091579bb1427b7c3d86c65ee354e46b83345fbd70100b65d5df2a4ec4cf397343f14d0e9ec92011b64c134d28cc93d0cabaede5fc873392932cb3757faac76dc08b1a9ee710366dade7b38290a716fbebe52643b4b6f7b3a5eb0b37c28909eeb7fe6b6897f468cceebafc3", 0xbb, 0x7, 0x5}], 0x140000) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r3, &(0x7f0000000000)=""/116, 0x74) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@private2}}, &(0x7f0000000ec0)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000940)='hfsplus\x00', &(0x7f0000000980)='./file0\x00', 0x9, 0x4, &(0x7f0000000c40)=[{&(0x7f00000009c0)="d7a9c7327e1e850d4f7629a385a5ffef077082597e2d32a1ff78d1e04330a295724de79f54ed0a6b7e91ec5fcb0c88a3cc2b70ac10f81bdf67ac4b3467cbee9c1a38c48300b4ec04cac5c19759d978fee888e7e456892a250dab3b3d1704b0aa82ea37f091565f98ba85ca692b067cbd8ae9cd4790e8d998104c", 0x7a}, {&(0x7f0000000a40)="02e53b995466c1ccd3c408cec7d2d141e7a436bc6a0a0e01cfdcd227a96fddf2bed7f54fecdab7", 0x27, 0xfc9}, {&(0x7f0000000a80)="d407accdea", 0x5, 0xffff}, {&(0x7f0000000ac0)="2effc9cf4a87eebd08bf07486260563a8cb5cdd18f541074c0ce678b77fd0d7bbcf1d89a2ed6b4afb9b157164fff014dcc91d19ca36f4b609608ea836c5558d21d6124c9a8178dae70c484dbfa5d8700b8a47698efd5a4a79c31cac43e18a3bf49a0065e88ddc52dd68a506016b3ec9ddf048c059402c2f912b964406eded7152b1287b0853f78fe7865d3eb214b515d6b4b4154c5db6d96ffede3419ece", 0x9e, 0x4}], 0x0, &(0x7f0000000f00)={[{@umask={'umask', 0x3d, 0x9}}, {@nobarrier='nobarrier'}, {@decompose='decompose'}, {@umask={'umask', 0x3d, 0x9}}, {@uid={'uid', 0x3d, r4}}, {@decompose='decompose'}, {@type={'type', 0x3d, "b513afc0"}}, {@force='force'}, {@nls={'nls', 0x3d, 'cp860'}}], [{@fsmagic={'fsmagic', 0x3d, 0xffffffff7fffffff}}, {@dont_measure='dont_measure'}, {@context={'context', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', 0xee00}}, {@euid_lt={'euid<', r5}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000540)='user\x00', &(0x7f0000000900)=@keyring={'key_or_keyring:'}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r6 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000800)='/dev/video1\x00', 0x2, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r6, 0x8010671f, &(0x7f0000000580)={&(0x7f0000000780)=""/98, 0x62}) [ 398.251433] batman_adv: batadv0: Removing interface: team0 [ 398.305914] team0: Cannot enslave team device to itself 17:05:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x8000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 398.334299] batman_adv: batadv0: Adding interface: team0 [ 398.340529] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:58 executing program 1: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x400) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:58 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r1, 0xc0884123, &(0x7f0000000840)={0x6, "cd648c50180f86e3f51cbdf94f89774c435d6424333e54d074ddd0576aa23ffb9e8c6faf7263ba01fbaf444d9c0448cb286dfce820f7c6c8c2a901a926fafa57", {0x4, 0x6}}) socket$inet(0x10, 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={r2}) kexec_load(0xc3, 0x8, &(0x7f00000005c0)=[{&(0x7f0000000100)="6ad7e76a85f1205b51cb0aa11af9d4ab87990e485dde2f33f1c53effeaba7f57d23f920ef57cc9709b08586c3e0e41130d85f79895c407d0ce3cfd57a7ec1b8914f5ec1aecadb4b62f8875699caf7ca497385a617e5fc060cb330cd6217ce092d2826fe6ac1c5e0f656d920176694c6291497c0f229c1c289351102cb7f12c39379a45331704e02da51e0b49fddf350b233a33cf", 0x94, 0x1, 0x4}, {&(0x7f00000001c0)="6eca3da04bb38ed71e5d4ba9a189255de0ab8389854ee4b3b9dc8fa909b3fccd5659eb6b607258af3b058df7737738b081524be039eeaf780431afa6f14c7e6f7aece2dfc228e143a24dc9ec6b4c41f5b8fa707c863ebe544758dde662ea01ac54797958c60678fab88547b43dcba75ebf230ac85a13587bdbeb9fc881ce9b2cf02e045a308885a6c7bfb8572709cf1b26bdec39bd0eddcf647a9b9bfb54586d0e2d3a6be9c464580db0584d0033c7a3db33a5835f2adecd121c9285426480c9366a17499405211110d21cdc77efbb52117da8a700c55763d175398221de428dba0fa9b02a70bc0c811613f0", 0xec, 0xbc, 0x3ff}, {&(0x7f00000002c0)="e26a", 0x2, 0x8, 0x4}, {&(0x7f0000000300)="e85e9a2be0fd36ebfadc1395a242d848a31f7b497c19950f8ef9ab5910e66e7b6e", 0x21, 0x7fff, 0x3f}, {&(0x7f0000000340)="6698444b81312ae79b9f156145456fbbaee93e0e8cf0283a66e7a43f60dcbcd2e1b64d92740297ac884172bdd70777c3269ea986080fa66003c6ed5f7b665446c672da44973d5edfdfa86b5158938d51f7560b567de41128e52e5892e7ecad30bac3740445892f1cc80f78ec29c9b37e23c676c136d647d97bc10290cbe819260a187ad117959d9f8b46b897a4ba7ca9d7b3378c59eeeb1ad77ec7f679c7f6e7500fbcd65bcec2fae41f72247171615fbb3db348c434ecc88452a56eb8fa3ff909d8be000cafae6c2d7a255416e7a95b538388b25f0e8f1b8f41ecd01f0b", 0xde, 0xfff, 0x9}, {&(0x7f0000000440)="2ff4b1a846dba496e595deaade8b9d1c47763979c08c9a90c3e6b043b3a49166ba6c36b5fceaaf9623818d54651b6b92fa858df5012e48d7d4d1addc9704a387eff2efb3db302c5fef1c996078580ccaf80cbcba319fb547b23a05ddfdb9ef324dd2d4168f4c536a4ebccfeddf312a89a540070b9282a7fdfda3fc548c15c80d1abbc830507d83b0", 0x88, 0x100, 0x3ff}, {&(0x7f0000000500)="ad", 0xfffffeef, 0x1, 0xe4}, {&(0x7f00000006c0)="cdb89dbff45cc3950e12aafc355795747cb85bf51adb49dbd9f87efe6dbea60866e4e02beae8b8d05930334e41c6d956d9ae9c1ca1fbf6bfbe8e331d534ca96226bf33d4528a9fd3fd857ff5b4bc78e6091579bb1427b7c3d86c65ee354e46b83345fbd70100b65d5df2a4ec4cf397343f14d0e9ec92011b64c134d28cc93d0cabaede5fc873392932cb3757faac76dc08b1a9ee710366dade7b38290a716fbebe52643b4b6f7b3a5eb0b37c28909eeb7fe6b6897f468cceebafc3", 0xbb, 0x7, 0x5}], 0x140000) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r3, &(0x7f0000000000)=""/116, 0x74) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@private2}}, &(0x7f0000000ec0)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000940)='hfsplus\x00', &(0x7f0000000980)='./file0\x00', 0x9, 0x4, &(0x7f0000000c40)=[{&(0x7f00000009c0)="d7a9c7327e1e850d4f7629a385a5ffef077082597e2d32a1ff78d1e04330a295724de79f54ed0a6b7e91ec5fcb0c88a3cc2b70ac10f81bdf67ac4b3467cbee9c1a38c48300b4ec04cac5c19759d978fee888e7e456892a250dab3b3d1704b0aa82ea37f091565f98ba85ca692b067cbd8ae9cd4790e8d998104c", 0x7a}, {&(0x7f0000000a40)="02e53b995466c1ccd3c408cec7d2d141e7a436bc6a0a0e01cfdcd227a96fddf2bed7f54fecdab7", 0x27, 0xfc9}, {&(0x7f0000000a80)="d407accdea", 0x5, 0xffff}, {&(0x7f0000000ac0)="2effc9cf4a87eebd08bf07486260563a8cb5cdd18f541074c0ce678b77fd0d7bbcf1d89a2ed6b4afb9b157164fff014dcc91d19ca36f4b609608ea836c5558d21d6124c9a8178dae70c484dbfa5d8700b8a47698efd5a4a79c31cac43e18a3bf49a0065e88ddc52dd68a506016b3ec9ddf048c059402c2f912b964406eded7152b1287b0853f78fe7865d3eb214b515d6b4b4154c5db6d96ffede3419ece", 0x9e, 0x4}], 0x0, &(0x7f0000000f00)={[{@umask={'umask', 0x3d, 0x9}}, {@nobarrier='nobarrier'}, {@decompose='decompose'}, {@umask={'umask', 0x3d, 0x9}}, {@uid={'uid', 0x3d, r4}}, {@decompose='decompose'}, {@type={'type', 0x3d, "b513afc0"}}, {@force='force'}, {@nls={'nls', 0x3d, 'cp860'}}], [{@fsmagic={'fsmagic', 0x3d, 0xffffffff7fffffff}}, {@dont_measure='dont_measure'}, {@context={'context', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', 0xee00}}, {@euid_lt={'euid<', r5}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000540)='user\x00', &(0x7f0000000900)=@keyring={'key_or_keyring:'}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r6 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000800)='/dev/video1\x00', 0x2, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r6, 0x8010671f, &(0x7f0000000580)={&(0x7f0000000780)=""/98, 0x62}) [ 398.423596] batman_adv: batadv0: Interface activated: team0 17:05:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x300, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xe000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet(0x2, 0x3, 0x54) r2 = socket$inet(0x10, 0x2, 0x0) dup(r2) setsockopt$inet_msfilter(r2, 0x0, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="b6"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000180)=0xc) bind$packet(r0, &(0x7f00000001c0)={0x11, 0xd, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'lo\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x222000, 0x0) setsockopt$packet_int(r8, 0x107, 0xe, &(0x7f0000000140)=0x4, 0x4) [ 398.566059] batman_adv: batadv0: Interface deactivated: team0 [ 398.596944] batman_adv: batadv0: Removing interface: team0 17:05:58 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x400) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xf000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 398.627280] team0: Cannot enslave team device to itself [ 398.650607] batman_adv: batadv0: Adding interface: team0 [ 398.656103] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:05:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x60000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:58 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x400) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 398.767241] batman_adv: batadv0: Interface activated: team0 17:05:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x9effffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:59 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x400) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xe0000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x500, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xf0ffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:59 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x400) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 399.228392] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 399.314778] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 399.373847] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 399.426022] batman_adv: batadv0: Interface deactivated: team0 [ 399.437282] batman_adv: batadv0: Removing interface: team0 [ 399.453125] team0: Cannot enslave team device to itself [ 399.460221] batman_adv: batadv0: Adding interface: team0 [ 399.465706] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 399.505433] batman_adv: batadv0: Interface activated: team0 [ 399.523295] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 399.536982] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 17:05:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x7ff00000, 0x0, 0xd0}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x58, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x80, 0x80900) 17:05:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:05:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xf5ffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:59 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x400) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:05:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:05:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xfcffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:05:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {0x0}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 399.673704] batman_adv: batadv0: Interface deactivated: team0 17:05:59 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="2800000026000106"], 0x28}}, 0x0) r1 = creat(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000027c0)={&(0x7f0000000400), 0xc, &(0x7f0000002780)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0, 0x0, 0x0, 0x0, 0x700}}], 0x344, 0x10122, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010005bde00"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="8800000024001d0f00"/20, @ANYRES32=r6, @ANYBLOB="0f000000f1ffffff000000000b0001006d717072696f000058000200"/112], 0x88}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x2c, r2, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xffffff36}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x804}, 0x20008890) 17:05:59 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x400) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 399.715999] batman_adv: batadv0: Removing interface: team0 17:05:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xfffff000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 399.763623] team0: Cannot enslave team device to itself [ 399.787516] batman_adv: batadv0: Adding interface: team0 17:06:00 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x400) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 399.796912] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xffffff7f, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:00 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {0x0}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 399.901180] batman_adv: batadv0: Interface activated: team0 [ 399.933790] batman_adv: batadv0: Interface deactivated: team0 [ 399.941137] batman_adv: batadv0: Removing interface: team0 [ 400.002714] team0: Cannot enslave team device to itself [ 400.016406] batman_adv: batadv0: Adding interface: team0 17:06:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xffffff9e, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:00 executing program 5: fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0xa12113431152d01f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$nl_sock_diag(0x10, 0x3, 0x4) r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYRES16, @ANYBLOB="080027010100fddbdf250800000006000b000300000014000500fe8000000000000000000000000000bb08000c000200000006000b001e00000008000700000000000800"], 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x400d4) sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16, @ANYBLOB="00012dbd7000fbdbdf250600000014000500ff01000000000000000000000000000108000800ac1414bb0800020003000000080004000300000008000c00ac1414bb0800020003000000080002000700000800040001000000"], 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x804) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @local}]}, 0x1c}}, 0x4000000) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) fcntl$getown(r4, 0x9) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f0000000240)) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x24, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @val={0x0, 0x99, {0x3, 0x23}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE]}, 0xfffffffffffffdc9}, 0x1, 0x0, 0x0, 0x40}, 0x400d004) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="000025bd7000fcdbdf256810000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4008005) r7 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r7, 0xc00c642e, &(0x7f00000000c0)) [ 400.034540] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 400.135232] batman_adv: batadv0: Interface activated: team0 [ 400.166614] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 17:06:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:00 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {0x0}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 400.215323] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 400.292344] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 400.322123] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 400.364158] batman_adv: batadv0: Interface deactivated: team0 [ 400.376310] batman_adv: batadv0: Removing interface: team0 [ 400.388015] team0: Cannot enslave team device to itself [ 400.397143] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 400.420350] batman_adv: batadv0: Adding interface: team0 [ 400.425857] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 400.480950] batman_adv: batadv0: Interface activated: team0 17:06:00 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:06:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xfffffff0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:00 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:00 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="2800000026000106"], 0x28}}, 0x0) r1 = creat(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000027c0)={&(0x7f0000000400), 0xc, &(0x7f0000002780)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0, 0x0, 0x0, 0x0, 0x700}}], 0x344, 0x10122, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010005bde00"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="8800000024001d0f00"/20, @ANYRES32=r6, @ANYBLOB="0f000000f1ffffff000000000b0001006d717072696f000058000200"/112], 0x88}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x2c, r2, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xffffff36}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x804}, 0x20008890) 17:06:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xa00, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xfffffff5, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:00 executing program 5: r0 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x55011}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000040)={0x4, {0x3a, 0x45366fe2, 0x8001, 0x6, 0x800}}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) 17:06:00 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 400.648669] batman_adv: batadv0: Interface deactivated: team0 [ 400.674176] batman_adv: batadv0: Removing interface: team0 17:06:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 400.717097] team0: Cannot enslave team device to itself 17:06:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xfffffffc, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 400.758780] batman_adv: batadv0: Adding interface: team0 [ 400.769193] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:01 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:01 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x2, 0x40000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, r0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r3, 0xf50f, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r4, 0xc00c642e, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 17:06:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0xffffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 400.915092] batman_adv: batadv0: Interface activated: team0 [ 400.969599] batman_adv: batadv0: Interface deactivated: team0 [ 400.975905] batman_adv: batadv0: Removing interface: team0 17:06:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 401.063005] team0: Cannot enslave team device to itself [ 401.092062] validate_nla: 33 callbacks suppressed [ 401.092069] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 401.113504] batman_adv: batadv0: Adding interface: team0 [ 401.133173] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 401.169298] batman_adv: batadv0: Interface activated: team0 [ 401.177807] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 401.218724] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 401.228564] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 401.246643] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 401.266043] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 17:06:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="6c0000022403c7337b2b35f5a40007ff1e001f00ff770c010000800900000091f1e85b0278a1d06659732dcc15b3f217020000bbe30500000000000000a55096ad030000005414ed6ebdd8d05d84651a311f61458c2af9deec47a8095950168ee1eef69579f9d0184161103323a21a034a6a490c8f12676a9cf23c66bd6095c7d9b6dceee25afcadfb2b7c031c3af9a678d7e4395230700186826b9d24e5d6cdd7f4bc8ee2edd5aa16e2ff42a3760d723861447434317191e76296962130c531026ae5606bf1409b1951c28784ee988ca0c2b0e1c932d1a46c2d8fb70583c871931154107f71fc626728b06a2780f7e5b8bf8f71e32d810f8c9812d6fb7449477000eeb8136750089c9f383faa4826848f55bc1b298a77fcaf5cb39155f61d37bb6dc3472659bc1e875b7991ce7c13f3840fb894c87bbb345a39db1ae60e5b4a", @ANYRES32, @ANYBLOB="00000000ffffffff1a0000000a0001006e6574656d0000003c0002000000000000000000000000000000000000000000000000000c000b00000000000052e0db140005000500", @ANYRESHEX=0x0], 0x6c}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000180), 0x54, 0x0) 17:06:01 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:01 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:06:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x2, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xc00, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2", 0x34}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x3, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2", 0x34}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x4, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 401.407544] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:06:01 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r1, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000080)={0x2, 0x8, [], 0x0, &(0x7f0000000040)=[0x0]}) 17:06:01 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x7, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 401.467756] batman_adv: batadv0: Interface deactivated: team0 [ 401.492358] batman_adv: batadv0: Removing interface: team0 [ 401.516982] team0: Cannot enslave team device to itself [ 401.537958] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 401.552532] batman_adv: batadv0: Adding interface: team0 [ 401.568328] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2", 0x34}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:01 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x8, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:01 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/nf_conntrack\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0xa}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000000}, 0x60000880) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x1) [ 401.633014] batman_adv: batadv0: Interface activated: team0 [ 401.670187] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:06:01 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@empty, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@private}}, &(0x7f0000000300)=0xe8) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000080)='./file0\x00', 0x100, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="97b95ae2f090d04f3a03180367c629472efcca80fb9b6dbc71947b4e563b4f33d843819a1e748c46a5ccb78a204df305399b841df8895d41ba9d32b4cb1647b63042c78ddc31eef9ab102f9f9f3fdc03928c5a5c2eb134f37786c13dd51ef21815ad640d5412ae62bbb2dd693496e62db594e9b210cfa329fe144b709c68a70f76c7981a14942f799f5754ceaf2bf96d693e2ac40d350d0933577538a15d370fde6970463d5a2fb5c2bd0b31e5fe", 0xae, 0xffff}, {&(0x7f0000000c40)="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", 0x1000}], 0x10b0, &(0x7f0000000340)={[{@bulk_read='bulk_read'}, {@no_bulk_read='no_bulk_read'}], [{@fsmagic={'fsmagic', 0x3d, 0x4}}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '/dev/dri/card#\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@euid_gt={'euid>', r0}}]}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) 17:06:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xe, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 401.713068] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 401.742392] audit: type=1326 audit(1608829561.936:57): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=20981 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0x0 17:06:02 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d576", 0x4e}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 401.818706] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:06:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xf, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:02 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 401.866665] batman_adv: batadv0: Interface deactivated: team0 [ 401.902762] batman_adv: batadv0: Removing interface: team0 17:06:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x60, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 401.931204] team0: Cannot enslave team device to itself [ 401.947116] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:06:02 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x40028, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x9, 0x260180) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 401.972960] batman_adv: batadv0: Adding interface: team0 17:06:02 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080), 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 402.004984] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 402.033340] batman_adv: batadv0: Interface activated: team0 17:06:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xe0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 402.069800] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 402.090573] batman_adv: batadv0: Interface deactivated: team0 [ 402.115282] batman_adv: batadv0: Removing interface: team0 [ 402.138297] team0: Cannot enslave team device to itself [ 402.158661] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 402.172139] batman_adv: batadv0: Adding interface: team0 [ 402.183551] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 402.217606] batman_adv: batadv0: Interface activated: team0 17:06:02 executing program 2: r0 = socket(0x2b, 0x1, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x6, 0xd, 0x0, 0x905400) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@empty, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@private1}}, &(0x7f0000000300)=0xe8) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/sctp\x00') r2 = socket$inet(0x10, 0x2, 0x8) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f00000001c0)={0xff, 0x5}) r3 = dup(r2) sendto$netrom(r3, &(0x7f0000000100)="b9e22ec4683db39cfdf623c0a867a05d487e911ef155e07604ecae1de945c893fb992ce3d4fc241178975833c8c7256497b87f57ffe26832c7bf11ca7fc81b76c94b85ec84adf8dc0ab864db4a9509567bc8d9a0c107e26847e6e2412c56ec7f901cd25a3ebf79bf2d44", 0x6a, 0x0, 0x0, 0x0) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x551100, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r3, 0x40043311, &(0x7f0000000000)) sendto$isdn(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="07000000ff0f0000fd2812b3402accdac44abcfbfa578924e9f48a4c529f22d521583d976819d2bcf1ba9d64640b5038102a3b146e734920f6df3a6a3d9fd3aa017942e9dc2200d8f8241f3ad73238431198fc17e3e24f2d76665d35ec1475248e767ae3bc6ad32e4a7c05084770d27951ee1aa65341a9933995618990d3d383daa0762120a84cf8a00c4350b6ca7ed2c9367cfd738ea3975b2d64d62d95fb2023e834a315852dd900"/181], 0x58, 0x0, &(0x7f0000000180)={0x22, 0x40, 0x3f, 0x7, 0x9d}, 0x6) 17:06:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d576", 0x4e}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:02 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080), 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xf0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x2000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 402.534857] audit: type=1326 audit(1608829562.726:58): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=20981 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460faa code=0x0 17:06:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x300, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:02 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080), 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d576", 0x4e}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 402.645528] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 402.683853] batman_adv: batadv0: Interface deactivated: team0 17:06:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000040)={0x1, [0x0]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000001a00)) pipe(0x0) ioctl$CHAR_RAW_GETSIZE(0xffffffffffffffff, 0x1260, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000011c0)=ANY=[@ANYBLOB="480000001000010429bd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="13000000000000002800128008000100736974001c00028006001000dc96000008000300ac1e0001060008000000006c"], 0x48}, 0x1, 0x0, 0x0, 0x40004}, 0x0) getitimer(0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) clock_settime(0x6, &(0x7f00000000c0)={0x0, 0x3938700}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) [ 402.704991] batman_adv: batadv0: Removing interface: team0 [ 402.723623] team0: Cannot enslave team device to itself 17:06:03 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 402.751918] batman_adv: batadv0: Adding interface: team0 [ 402.757416] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x700, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:03 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 402.898648] batman_adv: batadv0: Interface activated: team0 17:06:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871", 0x5b}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xe00, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:03 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xf00, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 403.225147] batman_adv: batadv0: Interface deactivated: team0 [ 403.253959] batman_adv: batadv0: Removing interface: team0 [ 403.272892] team0: Cannot enslave team device to itself [ 403.279751] batman_adv: batadv0: Adding interface: team0 [ 403.285247] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 403.312866] batman_adv: batadv0: Interface activated: team0 17:06:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x4800, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:03 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x6000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:03 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x20, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0xa}, 0x7ff, 0x1, 0x3, 0x4, 0x7ff, 0x3}, &(0x7f00000000c0)=0x20) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r3, 0x200002) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 17:06:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871", 0x5b}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xe000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871", 0x5b}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:03 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002, 0x0, @remote}, 0x5) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d00cbe4be841736ec8da1149ae8855c1ebcbb02b94d99fe91082535343c0000", @ANYRES16=0x0, @ANYBLOB="0300000000000000df250908000300000000667d4fa8711a49dc2c952a7a8dd5232133208c69efa92e5d6c8d81819221c11fac0136ae5a40754ef037f19cd7f7453cb836ecc225f0b9690d28c55a46c329fe0cd7c8", @ANYRES32=0x0, @ANYBLOB="0c00990000000000790000000a000600ffffffffffff00003800508012000400847ca42d7d0d6d6f61bab8315615000005000200030000000800030005ac0f000800030001ac0f000800070000000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x20851) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x0, 0x0, 0x0) [ 403.455998] batman_adv: batadv0: Interface deactivated: team0 [ 403.477529] batman_adv: batadv0: Removing interface: team0 17:06:03 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 403.522957] team0: Cannot enslave team device to itself [ 403.542534] batman_adv: batadv0: Adding interface: team0 [ 403.548211] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xf000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:03 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:03 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="000040000100010024000000001c08108f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_MGMT_A_DOMAIN={0xa, 0x1, 'minix\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @empty}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x840}, 0x10) [ 403.655428] batman_adv: batadv0: Interface activated: team0 [ 403.689623] batman_adv: batadv0: Interface deactivated: team0 [ 403.696982] batman_adv: batadv0: Removing interface: team0 [ 403.725212] team0: Cannot enslave team device to itself [ 403.733136] batman_adv: batadv0: Adding interface: team0 17:06:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:04 executing program 5: r0 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f0000000c40)={{r3}, "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"}) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r5, 0x40000000af01, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f0000000100)=0x300000000) ioctl$VHOST_SET_MEM_TABLE(r5, 0x4008af03, &(0x7f0000000280)=ANY=[]) r7 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000000200)=ANY=[@ANYRESOCT=r7, @ANYRESDEC=r2]) r8 = dup(r6) ioctl$VHOST_NET_SET_BACKEND(r5, 0x4008af30, &(0x7f0000000000)={0x0, r8}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000140)={0x7, &(0x7f0000000180)=[{}, {}, {}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r8, 0xc0086423, &(0x7f00000001c0)={r9}) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, &(0x7f0000000040)={r9, 0x2}) 17:06:04 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:04 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x120000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6u\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\x06ArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r2 = socket$kcm(0x29, 0x2, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000440)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000001c0), 0x10}, 0x78) socket$kcm(0x2b, 0x1, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20004000) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) sendmsg$kcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)}, 0x18080) sendmsg$kcm(r5, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0xb8830}], 0x4, 0x0, 0x0, 0x40020000}, 0x6d70) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r3, 0x0, 0x12, &(0x7f0000000180)='sy\x84kalle\xf4\xeb\x0e^\xccr\xdd\xe1J\x00'}, 0x30) 17:06:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de38", 0x62}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 403.773953] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 403.802068] batman_adv: batadv0: Interface activated: team0 17:06:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x4c00, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x1000000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de38", 0x62}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 403.927771] device wlan1 left promiscuous mode 17:06:04 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x2000000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:04 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x3000000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:04 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 404.421425] batman_adv: batadv0: Interface deactivated: team0 [ 404.429142] batman_adv: batadv0: Removing interface: team0 [ 404.437198] team0: Cannot enslave team device to itself [ 404.444809] device wlan1 entered promiscuous mode [ 404.450116] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 404.457178] batman_adv: batadv0: Adding interface: team0 [ 404.463063] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 404.491606] batman_adv: batadv0: Interface activated: team0 [ 404.501643] device wlan1 left promiscuous mode [ 404.642794] device wlan1 entered promiscuous mode [ 404.647956] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 404.655370] batman_adv: batadv0: Interface deactivated: team0 [ 404.662367] batman_adv: batadv0: Removing interface: team0 [ 404.671036] team0: Cannot enslave team device to itself [ 404.682938] batman_adv: batadv0: Adding interface: team0 17:06:04 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x4000000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de38", 0x62}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:04 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 404.688411] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 404.715520] batman_adv: batadv0: Interface activated: team0 17:06:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x5865, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:04 executing program 2: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000ffc000/0x3000)=nil, 0x3) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000200)={0x7, 0x8, [], 0x1, &(0x7f00000001c0)=[0x0]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000080)={{0x1, 0x2, 0x1, 0xfcf, '\x00', 0x2c5}, 0x1, 0x0, 0x7ff, r1, 0x3, 0xf5, 'syz0\x00', &(0x7f0000000040)=['\\-\x00', '\'++:(\x00', '\x00'], 0xa, [], [0x3, 0x2, 0x800, 0x1f]}) 17:06:05 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x7000000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1a", 0x65}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:05 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)) keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000080)='user\x00', &(0x7f0000000100)='.\x00') r4 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x200c0, 0x0) fcntl$setflags(r4, 0x2, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000140)=0x2) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000180)={0x6, 0x7ff, 0x1}) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r6, 0x0) ioctl$FIONCLEX(r6, 0x5450) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r5, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r5, 0x80089419, &(0x7f0000000040)) 17:06:05 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) r2 = openat$nvram(0xffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000240)=""/45) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a76301010000000000003ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f856f0bf8893cc7149595314f0771b65d33e129933dd93f99f"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpgrp(r0) ptrace$peek(0xffffffffffffffff, r3, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0)='keyring\x00', 0x0, 0x0, 0x0, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000700)={'gre0\x00', 0x0, 0x8, 0x40, 0x0, 0x2, {{0x18, 0x4, 0x1, 0x4, 0x60, 0x65, 0x0, 0x0, 0x29, 0x0, @remote, @broadcast, {[@ssrr={0x89, 0x1b, 0x7, [@multicast2, @local, @dev={0xac, 0x14, 0x14, 0x18}, @multicast2, @loopback, @loopback]}, @generic={0x7, 0x11, "a73b7a0ef552abf08daa8d1dcd45b6"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x1a, 0xffffffffffffffff, [{0x2, 0xa, "cef3bfdb8738e47a"}, {0x5, 0x2}, {0x1, 0x0, "4e9c"}, {0x6, 0x2}, {0x7, 0x2}]}, @noop]}}}}}) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, 0x0, 0x24000010) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 404.834160] batman_adv: batadv0: Interface deactivated: team0 [ 404.868989] batman_adv: batadv0: Removing interface: team0 [ 404.928316] team0: Cannot enslave team device to itself [ 404.952675] batman_adv: batadv0: Adding interface: team0 17:06:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x8000000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 404.958184] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:05 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xe000000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:05 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f00000000c0)) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0xc4c, 0x4) lseek(r0, 0x800002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000)='mptcp_pm\x00') r3 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000240)) write$binfmt_aout(r0, &(0x7f0000000580)=ANY=[], 0x23) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000002000)='./bus\x00', 0xc4042, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0x200004) 17:06:05 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='thermal_temperature\x00'}, 0x10) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 405.093912] ptrace attach of "/root/syz-executor.2"[21211] was attempted by "/root/syz-executor.2"[21215] [ 405.129841] batman_adv: batadv0: Interface activated: team0 [ 405.174080] batman_adv: batadv0: Interface deactivated: team0 [ 405.192327] batman_adv: batadv0: Removing interface: team0 [ 405.243938] team0: Cannot enslave team device to itself [ 405.264397] audit: type=1800 audit(1608829565.456:59): pid=21233 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16623 res=0 [ 405.275329] batman_adv: batadv0: Adding interface: team0 17:06:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x6000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:05 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1a", 0x65}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xf000000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:05 executing program 5: accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 405.299793] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 405.331218] batman_adv: batadv0: Interface activated: team0 17:06:05 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x60000000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:05 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0xfff9, 0x2, 0x1ff, 0x1, 0x0, "6373c8ffde895516"}) [ 405.457743] batman_adv: batadv0: Interface deactivated: team0 [ 405.476832] batman_adv: batadv0: Removing interface: team0 [ 405.520665] team0: Cannot enslave team device to itself [ 405.542507] batman_adv: batadv0: Adding interface: team0 17:06:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1a", 0x65}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:05 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, 0x0, 0x0) [ 405.562536] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 405.694574] batman_adv: batadv0: Interface activated: team0 [ 405.723318] batman_adv: batadv0: Interface deactivated: team0 [ 405.731689] batman_adv: batadv0: Removing interface: team0 [ 405.755959] team0: Cannot enslave team device to itself [ 405.769195] batman_adv: batadv0: Adding interface: team0 [ 405.777477] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 405.817183] batman_adv: batadv0: Interface activated: team0 [ 405.916425] audit: type=1800 audit(1608829566.106:60): pid=21272 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16623 res=0 17:06:06 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)) keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000080)='user\x00', &(0x7f0000000100)='.\x00') r4 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x200c0, 0x0) fcntl$setflags(r4, 0x2, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000140)=0x2) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000180)={0x6, 0x7ff, 0x1}) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r6, 0x0) ioctl$FIONCLEX(r6, 0x5450) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r5, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r5, 0x80089419, &(0x7f0000000040)) 17:06:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x9effffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:06 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, 0x0, 0x0) 17:06:06 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) 17:06:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e", 0x67}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x6558, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xe0000000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e", 0x67}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 406.042109] batman_adv: batadv0: Interface deactivated: team0 [ 406.067181] batman_adv: batadv0: Removing interface: team0 17:06:06 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, 0x0, 0x0) 17:06:06 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, &(0x7f00000000c0)={0x0, @bt={0x9, 0x3, 0x0, 0x5, 0x80000000, 0x3763, 0x6, 0x8, 0x800, 0x9, 0x6, 0x8, 0x4, 0x7, 0x1d, 0x21, {0x3, 0x5}, 0x2, 0x9}}) [ 406.113099] team0: Cannot enslave team device to itself [ 406.133917] validate_nla: 20 callbacks suppressed [ 406.133925] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 406.151363] batman_adv: batadv0: Adding interface: team0 17:06:06 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)) keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000080)='user\x00', &(0x7f0000000100)='.\x00') r4 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x200c0, 0x0) fcntl$setflags(r4, 0x2, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000140)=0x2) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000180)={0x6, 0x7ff, 0x1}) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r6, 0x0) ioctl$FIONCLEX(r6, 0x5450) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r5, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r5, 0x80089419, &(0x7f0000000040)) [ 406.179002] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:06 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 17:06:06 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x22000) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000040)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:06:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xf0ffffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 406.274684] batman_adv: batadv0: Interface activated: team0 [ 406.297674] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:06:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e", 0x67}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 406.320687] batman_adv: batadv0: Interface deactivated: team0 17:06:06 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 17:06:06 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)) keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000080)='user\x00', &(0x7f0000000100)='.\x00') r4 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x200c0, 0x0) fcntl$setflags(r4, 0x2, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000140)=0x2) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000180)={0x6, 0x7ff, 0x1}) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r6, 0x0) ioctl$FIONCLEX(r6, 0x5450) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r5, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r5, 0x80089419, &(0x7f0000000040)) [ 406.356719] batman_adv: batadv0: Removing interface: team0 [ 406.377327] team0: Cannot enslave team device to itself [ 406.399122] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 406.414841] batman_adv: batadv0: Adding interface: team0 [ 406.458340] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 406.494340] batman_adv: batadv0: Interface activated: team0 17:06:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x6800, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xf5ffffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:06 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000140)=0x2, 0x4) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x2}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:06:06 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)) keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000080)='user\x00', &(0x7f0000000100)='.\x00') r4 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x200c0, 0x0) fcntl$setflags(r4, 0x2, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000140)=0x2) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000180)={0x6, 0x7ff, 0x1}) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r6, 0x0) ioctl$FIONCLEX(r6, 0x5450) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r5, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r5, 0x80089419, &(0x7f0000000040)) 17:06:06 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 17:06:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xfcffffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 406.685651] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 406.716062] batman_adv: batadv0: Interface deactivated: team0 17:06:06 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)) keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000080)='user\x00', &(0x7f0000000100)='.\x00') r4 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x200c0, 0x0) fcntl$setflags(r4, 0x2, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000140)=0x2) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000180)={0x6, 0x7ff, 0x1}) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r6, 0x0) ioctl$FIONCLEX(r6, 0x5450) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r5, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r5, 0x80089419, &(0x7f0000000040)) 17:06:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:06 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)) keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000080)='user\x00', &(0x7f0000000100)='.\x00') r4 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x200c0, 0x0) fcntl$setflags(r4, 0x2, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000140)=0x2) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000180)={0x6, 0x7ff, 0x1}) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r6, 0x0) ioctl$FIONCLEX(r6, 0x5450) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r5, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r5, 0x80089419, &(0x7f0000000040)) [ 406.754200] batman_adv: batadv0: Removing interface: team0 [ 406.789026] team0: Cannot enslave team device to itself 17:06:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xfffff000, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:07 executing program 5: ioctl$IOCTL_VMCI_VERSION(0xffffffffffffffff, 0x79f, &(0x7f0000000180)=0x10000) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0xc}, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x3) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x208002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x561000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r7 = socket$inet(0x10, 0x2, 0x0) r8 = dup(r7) sendfile(r8, r6, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_GEM_CLOSE(r8, 0x40086409, &(0x7f0000000200)) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100dee6285ffed1ed6178980ace920ae6c1e51616f1258277e74633d92badfefb2d0eba05b4f60def82e25810712a3497c5b83194b9042b1fd3b68a9c56af531417f7ee313505384aaf09e43ef84a06cac8e978718a49f06a7bffdb2cc787cb60db130c6c4f72bba962e5e01be16cbc19d8244d1eda4830ea7ba834a53df174ed116ed15b6702d905813db6e2f20e7af15f2791bd4cc3fd0c75e70ab0e860d7b4176163ea38ffb3014d726c72ec736c"], &(0x7f00000001c0)=0x8) [ 406.821482] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 406.853528] batman_adv: batadv0: Adding interface: team0 [ 406.881736] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 406.945084] batman_adv: batadv0: Interface activated: team0 [ 406.967301] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 406.987351] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:06:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x6c00, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:07 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xffffff7f, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x7, 0x1, 0x201}, 0x14}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x7, 0x3, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x5}, @NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xa3b}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xffff}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfffffffc}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x81}]}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000040}, 0x8810) 17:06:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:07 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xffffff9e, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 407.140959] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 407.177717] batman_adv: batadv0: Interface deactivated: team0 17:06:07 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000280)}], 0x1}, 0x0) socket$kcm(0x11, 0x8000000000000003, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x101}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffce8}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x4050}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13, 0x1, 0x9, 0x3, 0x41, 0x1, 0x0, [], 0x0, r1, 0x0, 0x4, 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x401) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x104, 0x7}, 0x80, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0x1a0}, 0xe869) [ 407.208520] batman_adv: batadv0: Removing interface: team0 [ 407.247624] team0: Cannot enslave team device to itself [ 407.284341] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 407.303554] batman_adv: batadv0: Adding interface: team0 17:06:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:07 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x2, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xfffffff0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 407.330771] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xfffffff5, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 407.439655] batman_adv: batadv0: Interface activated: team0 [ 407.547896] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 407.566441] batman_adv: batadv0: Interface deactivated: team0 [ 407.594951] batman_adv: batadv0: Removing interface: team0 [ 407.616588] team0: Cannot enslave team device to itself [ 407.636720] batman_adv: batadv0: Adding interface: team0 [ 407.645317] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 407.674457] batman_adv: batadv0: Interface activated: team0 17:06:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x7400, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:07 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x3, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xfffffffc, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:08 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000280)}], 0x1}, 0x0) socket$kcm(0x11, 0x8000000000000003, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x101}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffce8}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x4050}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13, 0x1, 0x9, 0x3, 0x41, 0x1, 0x0, [], 0x0, r1, 0x0, 0x4, 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x401) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x104, 0x7}, 0x80, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0x1a0}, 0xe869) 17:06:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0xffffffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 407.846135] batman_adv: batadv0: Interface deactivated: team0 17:06:08 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x4, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 407.890315] batman_adv: batadv0: Removing interface: team0 [ 407.925057] team0: Cannot enslave team device to itself 17:06:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 407.942679] batman_adv: batadv0: Adding interface: team0 [ 407.960578] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:08 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x5, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 408.059426] batman_adv: batadv0: Interface activated: team0 17:06:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x2}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x7a00, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:08 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x6, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = dup(0xffffffffffffffff) ioctl$SNDCTL_DSP_SETDUPLEX(r2, 0x5016, 0x0) clone(0xe1004d7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) ioctl$SNDCTL_SEQ_GETINCOUNT(r2, 0x80045105, &(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0x1c) r3 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000), 0x4) socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000000)) sendto$isdn(r4, &(0x7f0000000300)={0x6, 0x1ff, "db8c623f2bd6b5443bc564b4186a175876617a6cafc3fce924ac3a435d0c14b14c2824ea7a6f8551c7b78292e76e6ea661989d4ea522c81cfc3e68922b858749b868ea0f2b42a7f0b815f980284ae9492cbdcaaba9879bb0a8eedd425659abeb756760fd939056a720dd63c634abb5e930e56eb1ba7ab7973701048adcee2e2695a1f88ab53af6972fa87194694cfd1c76ff238970442ffd113c2dcbb6dc9e23027074cea4ee780e2b1b131ba594"}, 0xb6, 0x40, &(0x7f0000000040)={0x22, 0x0, 0xc5, 0xf4, 0x8}, 0x6) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, 0x0, &(0x7f0000000140)) 17:06:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x3}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 408.285551] batman_adv: batadv0: Interface deactivated: team0 [ 408.302002] batman_adv: batadv0: Removing interface: team0 [ 408.333577] team0: Cannot enslave team device to itself [ 408.365171] batman_adv: batadv0: Adding interface: team0 17:06:08 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x7, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 408.380111] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x4}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 408.528106] batman_adv: batadv0: Interface activated: team0 [ 408.538738] IPVS: ftp: loaded support on port[0] = 21 17:06:08 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x8, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 408.568936] batman_adv: batadv0: Interface deactivated: team0 [ 408.574930] batman_adv: batadv0: Removing interface: team0 17:06:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x7}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 408.650892] team0: Cannot enslave team device to itself [ 408.674388] batman_adv: batadv0: Adding interface: team0 17:06:08 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x9, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 408.684093] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x8}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 408.758665] batman_adv: batadv0: Interface activated: team0 17:06:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x8100, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:09 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xa, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 408.970386] batman_adv: batadv0: Interface deactivated: team0 [ 408.977678] batman_adv: batadv0: Removing interface: team0 [ 409.022759] team0: Cannot enslave team device to itself [ 409.076254] batman_adv: batadv0: Adding interface: team0 [ 409.084176] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 409.153532] batman_adv: batadv0: Interface activated: team0 [ 409.620500] IPVS: ftp: loaded support on port[0] = 21 17:06:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = dup(0xffffffffffffffff) ioctl$SNDCTL_DSP_SETDUPLEX(r2, 0x5016, 0x0) clone(0xe1004d7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) ioctl$SNDCTL_SEQ_GETINCOUNT(r2, 0x80045105, &(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0x1c) r3 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000), 0x4) socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000000)) sendto$isdn(r4, &(0x7f0000000300)={0x6, 0x1ff, "db8c623f2bd6b5443bc564b4186a175876617a6cafc3fce924ac3a435d0c14b14c2824ea7a6f8551c7b78292e76e6ea661989d4ea522c81cfc3e68922b858749b868ea0f2b42a7f0b815f980284ae9492cbdcaaba9879bb0a8eedd425659abeb756760fd939056a720dd63c634abb5e930e56eb1ba7ab7973701048adcee2e2695a1f88ab53af6972fa87194694cfd1c76ff238970442ffd113c2dcbb6dc9e23027074cea4ee780e2b1b131ba594"}, 0xb6, 0x40, &(0x7f0000000040)={0x22, 0x0, 0xc5, 0xf4, 0x8}, 0x6) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, 0x0, &(0x7f0000000140)) 17:06:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900", 0x12}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0xe}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:09 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xfc, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x1f14f, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000012c0), 0x6}, 0x4100, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x80000000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x202800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000180)={0x10000, 0x3f, 0x0, 'queue1\x00', 0xc88}) ioctl$CHAR_RAW_BSZSET(r1, 0x40081271, &(0x7f0000000140)=0xc68) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)) ftruncate(0xffffffffffffffff, 0x5) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)={'wlan1\x00'}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000016c0)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000002c0)={r3, 0x918, 0x5}) r4 = socket$inet(0x2, 0x2, 0x2000000088) bind(r4, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet_udp_int(r4, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000b80)=ANY=[@ANYRESDEC=r3, @ANYRES16=r4, @ANYRESOCT], 0x4c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f00000002c0)={0x1, 0x8001, @start={r2, 0x0, "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", "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"}, [0x4a0, 0x20, 0x2, 0xff, 0x101, 0x3, 0x0, 0x0, 0x4, 0x3, 0x6, 0x6550, 0x401, 0xd2e, 0x101, 0xaf, 0x100, 0xfff, 0xa95c8aa, 0x40, 0xffffffff7fffffff, 0x3f, 0x20, 0x6, 0x3, 0x3, 0x400, 0x1, 0x2, 0x0, 0x5, 0x4, 0x11bf, 0x7, 0x8, 0x10000, 0x3f0000000, 0x2fc92fb0, 0xfff, 0x21, 0x20, 0x3, 0x4, 0x4, 0x2, 0xf2, 0x353a5e1c, 0x5790d44, 0x1, 0x100000001, 0x80, 0x1000000, 0xec, 0x401, 0x2, 0x8, 0x5, 0x4, 0x5, 0x401, 0x2, 0x8001, 0x3, 0x5090]}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000002c0)={{r0}, 0x0, 0x14, @inherit={0x50, &(0x7f0000000240)={0x0, 0x1, 0x100, 0x0, {0xade508ebc13dbb24, 0xfffffffffffff45e, 0x400, 0x8, 0x4}, [0x4]}}, @devid=r3}) 17:06:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900", 0x12}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0xf}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:10 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x300, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:10 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$SNDCTL_SEQ_GETINCOUNT(r0, 0x80045105, &(0x7f0000000040)) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) [ 409.758603] batman_adv: batadv0: Interface deactivated: team0 [ 409.781816] batman_adv: batadv0: Removing interface: team0 17:06:10 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x500, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 409.844187] team0: Cannot enslave team device to itself [ 409.861486] batman_adv: batadv0: Adding interface: team0 [ 409.866986] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x60}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 409.969220] batman_adv: batadv0: Interface activated: team0 [ 410.004023] batman_adv: batadv0: Interface deactivated: team0 [ 410.010357] batman_adv: batadv0: Removing interface: team0 [ 410.025618] team0: Cannot enslave team device to itself [ 410.042660] batman_adv: batadv0: Adding interface: team0 [ 410.057824] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 410.066134] IPVS: ftp: loaded support on port[0] = 21 [ 410.089880] batman_adv: batadv0: Interface activated: team0 17:06:10 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={0x0, 0x0, 0x18}, 0x10) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) connect$llc(r1, &(0x7f0000000380)={0x1a, 0x1, 0x0, 0x9}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @local, 0x14}, 0x80, 0x0}, 0x0) sendmmsg(r1, &(0x7f0000001380), 0x40003ad, 0x2000000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000100)={0x78, 0x0, 0x0, {0x0, 0x1, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1726}}}, 0x78) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000000)="0f79720cb878000f00d8b80f000f00d0f3ab0f4b55000f01c80f350f017500a5670fe80d75000000", 0x28}], 0x1, 0x47, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) readv(0xffffffffffffffff, 0x0, 0x0) removexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='os$\x00\x00\x00\x00\x00\x00']) 17:06:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0xe0}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900", 0x12}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:10 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0xfff, @private1, 0x7f}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e24, @local}], 0x3c) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:06:10 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x600, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x1f150, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 410.316079] batman_adv: batadv0: Interface deactivated: team0 [ 410.334118] batman_adv: batadv0: Removing interface: team0 17:06:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a680889", 0x1b}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:10 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x700, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:10 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 410.380327] team0: Cannot enslave team device to itself [ 410.387479] batman_adv: batadv0: Adding interface: team0 [ 410.404124] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 410.496109] batman_adv: batadv0: Interface activated: team0 17:06:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 410.560578] batman_adv: batadv0: Interface deactivated: team0 [ 410.573037] batman_adv: batadv0: Removing interface: team0 [ 410.614128] team0: Cannot enslave team device to itself [ 410.623903] batman_adv: batadv0: Adding interface: team0 [ 410.631311] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 410.683501] batman_adv: batadv0: Interface activated: team0 17:06:10 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={0x0, 0x0, 0x18}, 0x10) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) connect$llc(r1, &(0x7f0000000380)={0x1a, 0x1, 0x0, 0x9}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @local, 0x14}, 0x80, 0x0}, 0x0) sendmmsg(r1, &(0x7f0000001380), 0x40003ad, 0x2000000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000100)={0x78, 0x0, 0x0, {0x0, 0x1, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1726}}}, 0x78) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000000)="0f79720cb878000f00d8b80f000f00d0f3ab0f4b55000f01c80f350f017500a5670fe80d75000000", 0x28}], 0x1, 0x47, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) readv(0xffffffffffffffff, 0x0, 0x0) removexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='os$\x00\x00\x00\x00\x00\x00']) 17:06:10 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x900, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a680889", 0x1b}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:10 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000100)={0x57, 0x5, 0xa, {0x3, 0x1}, {0x3, 0x1}, @period={0x5b, 0x3, 0x20, 0x5, 0x8, {0x3, 0x6, 0xffff, 0xfff8}, 0x1, &(0x7f0000000080)=[0x0]}}) 17:06:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x1f151, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a680889", 0x1b}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:11 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xa00, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 410.876302] batman_adv: batadv0: Interface deactivated: team0 [ 410.887943] batman_adv: batadv0: Removing interface: team0 [ 410.911490] team0: Cannot enslave team device to itself 17:06:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c", 0x1f}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 410.934158] batman_adv: batadv0: Adding interface: team0 [ 410.957072] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:11 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x3, 0x70, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x203000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x20, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) sendmsg$NLBL_CALIPSO_C_LIST(r3, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000229bd7000fcdbdf25030000000810020002000000080001000300000008000100010000000800020002000000"], 0x34}}, 0x4080) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r6, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="a4020000", @ANYRES16=r7, @ANYBLOB="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"], 0x2a4}, 0x1, 0x0, 0x0, 0x800}, 0x4800) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 411.084322] batman_adv: batadv0: Interface activated: team0 [ 411.117735] batman_adv: batadv0: Interface deactivated: team0 [ 411.125826] batman_adv: batadv0: Removing interface: team0 [ 411.150532] team0: Cannot enslave team device to itself [ 411.162116] validate_nla: 24 callbacks suppressed [ 411.162131] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 411.194879] batman_adv: batadv0: Adding interface: team0 [ 411.200554] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 411.225939] batman_adv: batadv0: Interface activated: team0 17:06:11 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000100)={0x57, 0x5, 0xa, {0x3, 0x1}, {0x3, 0x1}, @period={0x5b, 0x3, 0x20, 0x5, 0x8, {0x3, 0x6, 0xffff, 0xfff8}, 0x1, &(0x7f0000000080)=[0x0]}}) 17:06:11 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x4000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0xe}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:11 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) ioctl$DRM_IOCTL_MODE_GETFB(r0, 0xc01c64ad, &(0x7f0000000100)={0x5, 0x3ff, 0x8, 0x3, 0x944, 0xdf0, 0x7fffffff}) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000140)={0x2d, 0x4, 0x0, {0x5, 0x100000000, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) 17:06:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c", 0x1f}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x1000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 411.393186] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 411.423539] batman_adv: batadv0: Interface deactivated: team0 17:06:11 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x80fe, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 411.444427] batman_adv: batadv0: Removing interface: team0 [ 411.476272] team0: Cannot enslave team device to itself 17:06:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c", 0x1f}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:11 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)={'syz1', "ee8a5c8a552fbe2fee83fb83421f5d807a32a704fef3bd089d8853f37a1a5b5b4f4223d3010e0cf79fae47ed431e83d2431a5dc364a41f8f27e73b66d0e5df88fefe197314f33ac3a0a8570cd8c2e262a0a717d883c97bc467b6a8327c51b71cbe94273593754a90135cfce33a8192a271c0939d50fda05a5852c2538d6fec82405263e47e9a93653edcdf666c412200c15d7140ac2c9467f29208a0232e8eeefd2c0e0ee63b517bab80639e7a02916b00cefa4da883b1a515fd577aca31551fa616e9908b862ee3a73f9bca4c2453de987d500c55e3fc2e4e839268c1c1e4b2800a80fee8c37522bdf859c465ffb1c56eff76fc"}, 0xf8) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000080)={0x100, 0x0, 0x2}) 17:06:11 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000100)={0x57, 0x5, 0xa, {0x3, 0x1}, {0x3, 0x1}, @period={0x5b, 0x3, 0x20, 0x5, 0x8, {0x3, 0x6, 0xffff, 0xfff8}, 0x1, &(0x7f0000000080)=[0x0]}}) [ 411.501421] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:06:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x60}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 411.547122] batman_adv: batadv0: Adding interface: team0 [ 411.575106] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0xe0}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:11 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xc0fe, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:11 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e24, @private=0xa010100}, @in={0x2, 0x4e20, @loopback}], 0x20) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:06:11 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000100)={0x57, 0x5, 0xa, {0x3, 0x1}, {0x3, 0x1}, @period={0x5b, 0x3, 0x20, 0x5, 0x8, {0x3, 0x6, 0xffff, 0xfff8}, 0x1, &(0x7f0000000080)=[0x0]}}) [ 411.691894] batman_adv: batadv0: Interface activated: team0 17:06:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde", 0x21}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 411.740086] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 411.747619] batman_adv: batadv0: Interface deactivated: team0 [ 411.783709] batman_adv: batadv0: Removing interface: team0 [ 411.821328] team0: Cannot enslave team device to itself [ 411.841528] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 411.861191] batman_adv: batadv0: Adding interface: team0 17:06:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x2000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:12 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xfc00, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:12 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0xc7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) 17:06:12 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) [ 411.874642] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 411.902515] batman_adv: batadv0: Interface activated: team0 17:06:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde", 0x21}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:12 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x10, 0x5, 0x0, 0x7}, 0x0, 0x8, 0xffffffffffffffff, 0x3) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:06:12 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xfe80, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 412.029760] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 412.054993] batman_adv: batadv0: Interface deactivated: team0 [ 412.069475] batman_adv: batadv0: Removing interface: team0 17:06:12 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) dup(r1) [ 412.113130] team0: Cannot enslave team device to itself [ 412.139038] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 412.156857] batman_adv: batadv0: Adding interface: team0 17:06:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde", 0x21}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 412.188714] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 412.284640] batman_adv: batadv0: Interface activated: team0 [ 412.305869] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 412.323670] batman_adv: batadv0: Interface deactivated: team0 [ 412.335141] batman_adv: batadv0: Removing interface: team0 [ 412.349098] team0: Cannot enslave team device to itself [ 412.354580] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 412.365447] batman_adv: batadv0: Adding interface: team0 17:06:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x3000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f0000000180)={0x4cd}) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, 0x1, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)) 17:06:12 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xfec0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:12 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x10, 0x2, 0x0) 17:06:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a", 0x22}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 412.372004] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 412.397458] batman_adv: batadv0: Interface activated: team0 17:06:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a", 0x22}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:12 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xff00, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 412.488291] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 412.525276] batman_adv: batadv0: Interface deactivated: team0 17:06:12 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') 17:06:12 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1e0, 0x14, 0x4, 0x70bd29, 0x25dfdbfb, {0x2b, 0x80}, [@INET_DIAG_REQ_BYTECODE={0x6e, 0x1, "93df47d64bd49ad07deb92642ea2befac143fe602ff3aaf754dc7b2da4a80f13dc9f47fd08722328e83321eab5541c7fe57297510b96138f3faff0a79f5a1fe7573c3ac89126c6b472a51d2d253c2a2fe4636450dc5cb43c5f0195ab899790526bcb40da335db36d6ca6"}, @INET_DIAG_REQ_BYTECODE={0x77, 0x1, "9f83b9f7b1a3911b948d2ac439c93724d2dff7e0f7df74f96382ea73d0e08e2329319a0a65adde4927606533cfc2ff7417957d33d441fc2481fde1edd811a4e40027b1656ee3497b457689607ea4823166758b4085f61fb06c3b98d3a71bbd64083c7a8feff2eee8dbf02eee27f39390ed5bf9"}, @INET_DIAG_REQ_BYTECODE={0x3f, 0x1, "b59dd67d4bb931b5e7c5eabf096e4534bbaf3b743e83d4d7c1473e2a87b8ec06b72320e7b7338f842328787a9d2e037cfa62d0b353cc5611f31320"}, @INET_DIAG_REQ_BYTECODE={0xa3, 0x1, "3952023126360c9c34ffe296e42aecf2092358689c2dddd1383207da8b4be097f2977b98fe29d8b2f091d117dd6604876758fdbe32f450d119102ad13e3f955b9f90ecdb11b9846b26a1982683e350cffdf845f517a18939ba5b360c95bcfb33a943f0b08175a2947c2d5514979d3fe0454926aa3f365bcb43efea2caa07cacea5f6c45be464933e1828d6d0e2460b093d1b23f6edca1b1b93033db26c6225"}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000000) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)) [ 412.556766] batman_adv: batadv0: Removing interface: team0 [ 412.600009] team0: Cannot enslave team device to itself [ 412.629085] batman_adv: batadv0: Adding interface: team0 17:06:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 412.634596] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 412.712300] batman_adv: batadv0: Interface activated: team0 [ 412.741532] batman_adv: batadv0: Interface deactivated: team0 [ 412.747673] batman_adv: batadv0: Removing interface: team0 [ 412.777430] team0: Cannot enslave team device to itself [ 412.807022] batman_adv: batadv0: Adding interface: team0 17:06:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x4000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:13 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xe}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a", 0x22}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:13 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000c40)={0x2, 0xc2, "ea0719b855188ef55a58be35fbda03ea41a40c9ba3918b5e2ffc50b1fd6ecd4b0e116156391bdcd59dd34f054144f878bc49556df203f2c7b7582f179e846de74a83a9490a7428a7c360bbb9195d0567cb4094c8fedb91bb43f388e5f8eb8ea6c65da2a828099aba199a9d74bd04e1a91dd4b2dea3544d6768dae38227564ce8f9f91d899e79a2b9636c7d904d7ac4c16cfc287ea0a5fa9feaa6cd9ed8d8188d19cd7970cd2100b0cbfdaf784041e5dc59e4e46faf5076fefcc004ecff13ec49e7da"}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000980)='trusted.overlay.opaque\x00', &(0x7f00000009c0)='y\x00', 0x2, 0x3) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000a00)={r2}, 0x8) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r2, 0xc01064bd, &(0x7f0000000b00)={&(0x7f0000000a40)="7bd16cb32c9160e9b96d2308941764a5772c27294ece7e15f3c63275bd67300a147a0714b6131529a748014db2da2b3609c44d3d1e98cf7303f2f3d40da1ee09209c475e845a8df5ef2573c0b5d2fec91327df49e09a60c41a3306fa3b13024e3d1558de580d484e50f3a9f5a902ef8afa5c7cdb1357474a9f33c106d73ba4099dce263a2ab7b05ad2f9f655fe1608ce9233f51139c4236b04144e200260399c576464c33fa5c56956149a33db2a", 0xae, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r3, 0xc00464be, &(0x7f0000000b40)={r4}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x4, @private0={0xfc, 0x0, [], 0x4}, 0x1}, @in6={0xa, 0x4e23, 0x3f, @ipv4={[], [], @broadcast}, 0x5}, @in6={0xa, 0x4e22, 0x80000000, @local, 0x10001}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e20, 0x9, @private2, 0xffff}, @in={0x2, 0x4e21, @private=0xa010100}, @in6={0xa, 0x4e22, 0x0, @mcast1, 0x7}, @in6={0xa, 0x4e23, 0xe6f, @local, 0x9}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e21, 0x28, @ipv4={[], [], @broadcast}, 0x800}], 0xf4) kexec_load(0xb86, 0xa, &(0x7f0000000740)=[{&(0x7f0000000040)="095f7a2f8e55ad4f2f", 0x9, 0x557e, 0xd9}, {&(0x7f0000000200)="1244a7cecd01f0503a1d001fc1a2ec4eddfa93770171012d5bb33ebbad9e090cd7e5c8cd15e839289ac6cfe3f360c37973d6de4076c947261d69c348338be4448c57c02d17a7176d2595d361e9a8135ddc8a07c2e6f05b098c87bd1739d61f032e0d9abc6b7a6474c4c17d14c00f8379063b1acb5930bb3b048977778433aef417f4ec5283948145acea2ccbc0a32ad068577e95255252386a5c86318287b5309803d994706554b4689feac812c9e74b6fd9e4fb3e103354648b755f31fb8a8dcc4bc5f8e73b5e1f95121bea8f52cd4c5393a07d", 0xd4, 0x80000000, 0xffff}, {&(0x7f0000000080)="3182cd91aab60a29b8452bf5b2d046f18adeff65a8f0660aa00e32bb5575b0730a6d8d1dea", 0x25, 0x1, 0xf51}, {&(0x7f0000000300)="349a932bcd81946337697c330e2a1541514776815d7df1096a4cfcc21272d4dfb6df1f5f22b347879fdca24aa6c18682d284424160b1134ea77847c9092d903d1dfba50d32a36f40a51611df91154129d83e67b91232efaba39e1e1dda5b952ee15b81a840c642bb4f84174a8d62149e5f4ceda8d80334175a96d1fb904ef3675997748ba16d6a923f2fe10b8d01b5960c32dac33053140a26d4d966867808b53bee3ee9cf0cef92065796d442d801dd3e3f8021def3265f28bf70b08924be7dacd30ddefee753187c", 0xc9, 0x516b, 0x400}, {&(0x7f0000000400)="ddd39b0e8bd4647c40b1c7e1ad7d7a27fbd41b", 0x13, 0x80, 0x81}, {&(0x7f0000000440)="6dc2768300d79d6a08cd38f81352ce2292ed12f7b60fe4313b655a46409576d050d734579e5eb2fdd237a18ac9856d48617b7cde3f310eadb4d003765bb72828d4e30f73a634e66783ca3f6223babcee98d72e818d5819a52df4465b8f8311a4569386425634f1a574bfd1f8b87a83e7eaf044cf577c22518b33270634c35bf58a042b5bc47cb5b1f1", 0x89, 0x3ff, 0x9}, {&(0x7f0000000500)="2c48ed8b167def1bb9e9ce74f2109f99ba97db6929330d54e17322f2f36c2a00afbbfe8f1c730b0c92b09f9c08bd1943c8f8986227d4533fb45d020cb93fc359bd39aabf8b7de8e552c1c5f03f6ae2303eb2b3cb6ce4742816b6680b74e089cc1c2a7ad9aa95c9e900dfcf59ca514e757a628993f319f5cb6f498154fdd4a3", 0x7f, 0x6285, 0x9}, {&(0x7f0000000580)="543a66c6cd75d5e4e7aec49c01d3a5c5025469dbb61762973d99cb5ed2407be1863097184dc303beccd1689b3341712d5ec3db3ea467bd066b54040e2b23a1621c2083e627c2577dc40cb720cf6cd4d789cdb64e2365c93b45b43c9559bfd0fbae76db4504d3bbc6e2d70d01b71186fee007bd1662055a3790a2b0f7bfb9e5", 0x7f, 0x8, 0x1}, {&(0x7f0000000600)="fb", 0x1, 0x2, 0x5}, {&(0x7f0000000640)="15cdd22b71bccfb820d5c8aca9ef82404b6cf822561f12b43a680907eba1fccc7a816a253a45acf57413d737e55fa71452cbaccaf1e0c27a874c9dbcf46f05c7d692b94d8f9d2f70c1b0cec7b5ec376a6cb1ec60be43b8d1370990cf975855aff31cd9667bf96e40d1aaa8b174e9a1a8b09c018796b25bb8d2306181bcafacfcb865f7c5825faa8da80942430630bc6395dcbe396ee719f03a8ccf7359f811dc2a02e3505bd55ea9c57104fc2de40bdd60d059397697fc3e1a57720051bf4c810898133bdc07f803c472", 0xca, 0x0, 0xfffffffffffffff7}], 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ubi_ctrl\x00', 0x40202, 0x0) ioctl$sock_SIOCADDDLCI(r5, 0x8980, &(0x7f0000000d40)={'sit0\x00', 0x2}) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x41, 0x0) keyctl$session_to_parent(0x12) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f00000008c0)=[@in6={0xa, 0x4e20, 0x10000, @dev={0xfe, 0x80, [], 0x42}, 0x3}, @in={0x2, 0x4e23, @private=0xa010100}, @in6={0xa, 0x4e20, 0x800, @private0={0xfc, 0x0, [], 0x1}, 0x9f}, @in6={0xa, 0x4e23, 0x3, @empty, 0xfffffff8}, @in6={0xa, 0x4e24, 0x7, @private1, 0x8}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e20, @loopback}], 0xa0) 17:06:13 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') [ 412.814853] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 412.854093] batman_adv: batadv0: Interface activated: team0 17:06:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xf}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:13 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 412.944242] batman_adv: batadv0: Interface deactivated: team0 [ 412.969017] batman_adv: batadv0: Removing interface: team0 17:06:13 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000040)={0x0, 0x0, {0x8, 0x80, 0x201f, 0x7, 0x6, 0x7, 0x0, 0x6}}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:06:13 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x2000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 413.036840] team0: Cannot enslave team device to itself [ 413.054062] batman_adv: batadv0: Adding interface: team0 [ 413.064173] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x60}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 413.184935] batman_adv: batadv0: Interface activated: team0 [ 413.213965] batman_adv: batadv0: Interface deactivated: team0 [ 413.226780] batman_adv: batadv0: Removing interface: team0 [ 413.245892] team0: Cannot enslave team device to itself [ 413.256863] batman_adv: batadv0: Adding interface: team0 [ 413.267644] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x5000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:13 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:13 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x1) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) 17:06:13 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x3000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xe0}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 413.297599] batman_adv: batadv0: Interface activated: team0 17:06:13 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x4000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xf0}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:13 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000040)={0x66cf5271e0a0adf0, 0x8}) 17:06:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:13 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 413.411945] batman_adv: batadv0: Interface deactivated: team0 [ 413.442896] batman_adv: batadv0: Removing interface: team0 [ 413.494011] team0: Cannot enslave team device to itself [ 413.521468] batman_adv: batadv0: Adding interface: team0 17:06:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x300}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 413.526970] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 413.655994] batman_adv: batadv0: Interface activated: team0 [ 413.678403] batman_adv: batadv0: Interface deactivated: team0 [ 413.684619] batman_adv: batadv0: Removing interface: team0 17:06:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x6000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:13 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x5000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x700}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:13 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:13 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = socket$inet(0x10, 0x2, 0x0) dup(r1) finit_module(r1, &(0x7f0000000040)='/dev/dri/card#\x00', 0x2) 17:06:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 413.704371] team0: Cannot enslave team device to itself [ 413.711134] batman_adv: batadv0: Adding interface: team0 [ 413.716616] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 413.742636] batman_adv: batadv0: Interface activated: team0 17:06:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xe00}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:14 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) [ 413.846917] batman_adv: batadv0: Interface deactivated: team0 [ 413.877333] batman_adv: batadv0: Removing interface: team0 17:06:14 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:14 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x6000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 413.910741] team0: Cannot enslave team device to itself [ 413.949370] batman_adv: batadv0: Adding interface: team0 [ 413.954880] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xf00}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 414.042177] batman_adv: batadv0: Interface activated: team0 [ 414.065496] batman_adv: batadv0: Interface deactivated: team0 [ 414.078490] batman_adv: batadv0: Removing interface: team0 [ 414.105851] team0: Cannot enslave team device to itself [ 414.124460] batman_adv: batadv0: Adding interface: team0 [ 414.131005] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x7000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:14 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x7000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:14 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:14 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x800, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000080)) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) 17:06:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 414.163848] batman_adv: batadv0: Interface activated: team0 17:06:14 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x8000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x6000}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 414.300583] batman_adv: batadv0: Interface deactivated: team0 [ 414.318184] batman_adv: batadv0: Removing interface: team0 17:06:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 414.357446] team0: Cannot enslave team device to itself [ 414.381139] batman_adv: batadv0: Adding interface: team0 17:06:14 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000040)=0x2) [ 414.386641] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xe000}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:14 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x9000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 414.531507] batman_adv: batadv0: Interface activated: team0 [ 414.570675] batman_adv: batadv0: Interface deactivated: team0 [ 414.581580] batman_adv: batadv0: Removing interface: team0 [ 414.607084] team0: Cannot enslave team device to itself [ 414.614744] batman_adv: batadv0: Adding interface: team0 17:06:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x8000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:14 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) kexec_load(0x5, 0x6, &(0x7f0000000340)=[{&(0x7f0000000100)="e1fadeb2ab38fc105e23c1dd206190bf8bd1fffad6f79535754050cb8fad3a6e16d029946b7e9811a6173c07ef908b3d8a2739924ca514c047ed7967eec0a9bd53b5caa3eb11fe45d5910cc950720a15e1ec10b42b98072b5b88814810e09d2b0cebc22d439d93202def3a225ebcf9f91d88c9efccac25da8f96cca8558f1084b47d5f5898c72d6e87bfaf91b01806", 0x8f, 0x7, 0x4}, {&(0x7f0000000040)="ad1f6f79fe0664a0b51eed0b5c4867ef0d0268f7d968", 0x16, 0xd87c, 0xfe}, {&(0x7f0000000080)="01d0b9d5c8c7db452a3346ca85526e50b3989e8cf874", 0x16, 0xef2, 0x9}, {&(0x7f00000001c0)="d0bfe76a399ca277228dcfa78a72b04a4a2a397e33df379ec7c486353a7b96b92b970ad469f1640985", 0x29, 0x0, 0x3}, {&(0x7f0000000200)="c624a3c7117b9604b1ef54c03a2213836bbffb9976aac33c5d5d53ae9a1f7ed99d574e088f81adcd48201f064f1fcc5e63e40b32a53d90395f19b53186ee829530e01053f55cd8364ebe3170292455fcf635e7618b93494372391f44137af798ab06ae30d2a589a7f91718d5eb05d1aeec94a0c52384021b14c031f8c1ff19db0490d3e4ee233401", 0x88, 0x6, 0x1c9}, {&(0x7f00000002c0)="b5c2f72a84c0e39402854436cc5c08a88d84b4c6e68e8017a15a92edc9e90aef2fbc91a3cbdc1756a52c7a7707b3fc85d49ac3eca3a22b29c776d8d3990da7a4ec64c8de6fac261c8e9384add82010c58ddb", 0x52, 0x9, 0xfffffffffffffffa}], 0x160000) 17:06:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xf000}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:14 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xa000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 414.626176] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 414.655178] batman_adv: batadv0: Interface activated: team0 [ 414.745649] batman_adv: batadv0: Interface deactivated: team0 [ 414.769836] batman_adv: batadv0: Removing interface: team0 17:06:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:15 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x40000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 414.801019] team0: Cannot enslave team device to itself 17:06:15 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) mlockall(0x0) 17:06:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 414.832165] batman_adv: batadv0: Adding interface: team0 [ 414.845657] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:15 executing program 1: perf_event_open(0x0, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 414.956269] batman_adv: batadv0: Interface activated: team0 [ 414.988626] batman_adv: batadv0: Interface deactivated: team0 [ 414.999039] batman_adv: batadv0: Removing interface: team0 [ 415.023002] team0: Cannot enslave team device to itself [ 415.037378] batman_adv: batadv0: Adding interface: team0 [ 415.044590] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xa000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:15 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xf5ffffff, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x3, 0x1, 0x6}]}, 0x1c}}, 0x0) 17:06:15 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) r1 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)) 17:06:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9", 0x3}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:15 executing program 1: perf_event_open(0x0, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 415.070806] batman_adv: batadv0: Interface activated: team0 [ 415.181366] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 415.200790] batman_adv: batadv0: Interface deactivated: team0 [ 415.208666] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #2: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) 17:06:15 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xfc000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:15 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9", 0x3}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x8, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 415.251056] batman_adv: batadv0: Removing interface: team0 [ 415.265883] EXT4-fs (loop5): get root inode failed [ 415.271852] EXT4-fs (loop5): mount failed [ 415.286615] team0: Cannot enslave team device to itself [ 415.298429] batman_adv: batadv0: Adding interface: team0 [ 415.315805] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 415.356213] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #2: comm syz-executor.5: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 415.419959] EXT4-fs (loop5): get root inode failed 17:06:15 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:15 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xfe800000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 415.440456] EXT4-fs (loop5): mount failed [ 415.453595] batman_adv: batadv0: Interface activated: team0 [ 415.494358] batman_adv: batadv0: Interface deactivated: team0 [ 415.505036] batman_adv: batadv0: Removing interface: team0 [ 415.559043] team0: Cannot enslave team device to itself [ 415.568824] batman_adv: batadv0: Adding interface: team0 [ 415.574311] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xc000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2, 0x6}]}, 0x1c}}, 0x0) 17:06:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9", 0x3}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:15 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:15 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xfec00000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 415.608638] batman_adv: batadv0: Interface activated: team0 17:06:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f8", 0x4}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:15 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xff000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x4, 0x6}]}, 0x1c}}, 0x0) 17:06:16 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 415.736021] batman_adv: batadv0: Interface deactivated: team0 [ 415.760980] batman_adv: batadv0: Removing interface: team0 [ 415.821264] team0: Cannot enslave team device to itself [ 415.843911] batman_adv: batadv0: Adding interface: team0 17:06:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x5, 0x6}]}, 0x1c}}, 0x0) [ 415.854334] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:16 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffff5, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:16 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 415.978309] batman_adv: batadv0: Interface activated: team0 [ 416.012080] batman_adv: batadv0: Interface deactivated: team0 [ 416.019408] batman_adv: batadv0: Removing interface: team0 [ 416.042467] team0: Cannot enslave team device to itself [ 416.054952] batman_adv: batadv0: Adding interface: team0 [ 416.071381] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xe000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x6, 0x6}]}, 0x1c}}, 0x0) 17:06:16 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000240)={0x8}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x6000, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0xa, 0x0) r5 = dup(r4) ioctl$BTRFS_IOC_INO_PATHS(r2, 0xc0389423, &(0x7f00000002c0)={0x0, 0x40, [0x28800000000, 0x1ff, 0x1ff, 0x100000001], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) fsetxattr(r5, &(0x7f0000000180)=@known='system.sockprotoname\x00', &(0x7f00000001c0)='/dev/dri/card#\x00', 0xf, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r5, 0xc010640b, &(0x7f0000000300)={0x0, 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000400)=0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000380), 0xc, &(0x7f00000006c0)={&(0x7f0000000440)=@updpolicy={0x248, 0x19, 0x1, 0x70bd27, 0x25dfdbfc, {{@in=@remote, @in=@local, 0x4e20, 0x80, 0x4e20, 0x6, 0x2, 0x80, 0x20, 0x6c, 0x0, 0xee00}, {0xfe4, 0x3, 0x2, 0x2, 0x1ff, 0x7, 0x6, 0x8}, {0xffff, 0x1, 0x5, 0x9}, 0x1, 0x6e6bbe, 0x0, 0x0, 0x1}, [@migrate={0x50, 0x11, [{@in6=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@local, @in6=@remote, 0x3c, 0x3, 0x0, 0x3507, 0xa, 0xa}]}, @offload={0xc, 0x1c, {r7, 0x3}}, @policy_type={0xa}, @user_kmaddress={0x2c, 0x13, {@in6=@ipv4={[], [], @remote}, @in6=@private2={0xfc, 0x2, [], 0x1}, 0x0, 0x2}}, @offload={0xc, 0x1c, {0x0, 0x3}}, @mark={0xc, 0x15, {0x35075c, 0x3}}, @sa={0xe4, 0x6, {{@in6=@mcast2, @in=@rand_addr=0x64010102, 0x4e24, 0x3, 0x4e20, 0x5, 0x2, 0xa0, 0x90, 0x3c, 0x0, r8}, {@in=@local, 0x4d5, 0x3c}, @in6=@loopback, {0x7ff, 0x9, 0x6, 0xb014, 0x9, 0x7ff, 0x7}, {0x5, 0xe5f9, 0xfffffffffffffff8, 0x8}, {0x400, 0x9, 0x2084}, 0x70bd28, 0x3506, 0x2, 0x2, 0x6, 0x78}}]}, 0x248}, 0x1, 0x0, 0x0, 0x4000000}, 0x40880) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f0000000340)={r6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r1, 0xc01464a6, &(0x7f0000000740)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) 17:06:16 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f8", 0x4}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:16 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x7ffffffff000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 416.123649] batman_adv: batadv0: Interface activated: team0 17:06:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f8", 0x4}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 416.217898] validate_nla: 32 callbacks suppressed [ 416.217908] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:06:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x8, 0x6}]}, 0x1c}}, 0x0) 17:06:16 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:16 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xf0ffffff7f0000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:16 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x5, 0x2, 0xff, 0x1, 0x0, 0x2, 0x80010, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x3}, 0x40400, 0x3f, 0x7fffffff, 0x6, 0x9, 0x401, 0x70d5}, 0xffffffffffffffff, 0xd, r2, 0x8) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x10000, 0x0, 0x4, 0x0, 0x3, "162235a33c7a5088b85c37be57129d8a56a3d5"}) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)) [ 416.330723] batman_adv: batadv0: Interface deactivated: team0 [ 416.348097] batman_adv: batadv0: Removing interface: team0 17:06:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x9, 0x6}]}, 0x1c}}, 0x0) [ 416.375449] team0: Cannot enslave team device to itself [ 416.403241] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 416.426553] batman_adv: batadv0: Adding interface: team0 [ 416.454997] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 416.492441] batman_adv: batadv0: Interface activated: team0 [ 416.508476] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 416.523277] batman_adv: batadv0: Interface deactivated: team0 [ 416.533508] batman_adv: batadv0: Removing interface: team0 [ 416.554428] team0: Cannot enslave team device to itself [ 416.564977] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:06:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x10000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:16 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x1a, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:06:16 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x100000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:16 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, 0x0) 17:06:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0xa, 0x6}]}, 0x1c}}, 0x0) 17:06:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 416.574422] batman_adv: batadv0: Adding interface: team0 [ 416.580656] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 416.605463] batman_adv: batadv0: Interface activated: team0 17:06:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0xb, 0x6}]}, 0x1c}}, 0x0) [ 416.690312] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:06:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:16 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, 0x0) 17:06:16 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x200000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 416.744430] batman_adv: batadv0: Interface deactivated: team0 17:06:16 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'ip_vti0\x00', &(0x7f00000002c0)={'erspan0\x00', 0x0, 0x8, 0x700, 0x3, 0x5, {{0x7, 0x4, 0x1, 0x27, 0x1c, 0x64, 0x0, 0x1, 0x2f, 0x0, @local, @empty, {[@end, @ra={0x94, 0x4, 0x1}]}}}}}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x44001) r4 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r6 = socket$inet(0x10, 0x2, 0x0) r7 = dup(r6) sendfile(r7, r5, &(0x7f0000000040)=0x103000, 0x8001) sendmsg$IPSET_CMD_FLUSH(r7, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x4, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r4, 0xc00c642e, &(0x7f00000000c0)) [ 416.787863] batman_adv: batadv0: Removing interface: team0 [ 416.822900] team0: Cannot enslave team device to itself 17:06:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x10, 0x6}]}, 0x1c}}, 0x0) [ 416.851460] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 416.881783] batman_adv: batadv0: Adding interface: team0 [ 416.913999] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 416.966874] batman_adv: batadv0: Interface activated: team0 [ 416.994389] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 417.013862] batman_adv: batadv0: Interface deactivated: team0 [ 417.038653] batman_adv: batadv0: Removing interface: team0 [ 417.046361] team0: Cannot enslave team device to itself [ 417.059673] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 417.074095] batman_adv: batadv0: Adding interface: team0 17:06:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x20000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:17 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, 0x0) 17:06:17 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x300000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:17 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f4}, r0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x8, 0x2, 0xffff}) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r5, 0x80083313, &(0x7f0000000100)) r6 = dup(r2) sendfile(r6, r1, &(0x7f0000000040)=0x103000, 0x8001) write$sequencer(r5, &(0x7f0000000200)=[@echo=0x30, @e={0xff, 0x0, 0x9, 0x7f, @SEQ_CONTROLLER=0xff, 0x3, 0x5, 0x20}], 0xc) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) 17:06:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x300, 0x6}]}, 0x1c}}, 0x0) [ 417.081876] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 417.107455] batman_adv: batadv0: Interface activated: team0 17:06:17 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x0, 0x0}) 17:06:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x500, 0x6}]}, 0x1c}}, 0x0) 17:06:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, 0x0) r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 417.199896] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 417.232717] batman_adv: batadv0: Interface deactivated: team0 17:06:17 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x400000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:17 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x400102, 0x0) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) [ 417.279570] batman_adv: batadv0: Removing interface: team0 [ 417.306506] team0: Cannot enslave team device to itself 17:06:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x600, 0x6}]}, 0x1c}}, 0x0) [ 417.340155] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 417.359899] batman_adv: batadv0: Adding interface: team0 [ 417.394123] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 417.488764] batman_adv: batadv0: Interface activated: team0 [ 417.508180] batman_adv: batadv0: Interface deactivated: team0 [ 417.514438] batman_adv: batadv0: Removing interface: team0 17:06:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x48000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:17 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x0, 0x0}) 17:06:17 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x500000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) r3 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x93, 0x20802) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000300)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r2, &(0x7f0000000100)="6be5f8eb0a4198c829798bc55521eedb48c0b4b8e67846e9a690deb92c9122e0ff5b4bb1c78fe3dd59da5f6e48438946961481fe974449a224ed27ebfd67a10a3782049a7fad1bd32635a792724dd6fac072e4fd87815b7521035c131057bba67f8ff2dac490d42f806f8c4ce58ed2a2ed22c2363f9bd997412f94922bc8531557eceb239b1b6818704a1fd615dfa1ca658fff5275679929082612", &(0x7f00000001c0)=""/212, 0x4}, 0x20) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000380)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000400)=""/128, 0x80}], 0x1, &(0x7f00000004c0)=""/171, 0xab}, 0x20}, {{&(0x7f0000000580)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000000600)=""/23, 0x17}, {&(0x7f0000000640)=""/67, 0x43}], 0x3}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000700)=""/170, 0xaa}, {&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/94, 0x5e}, {&(0x7f0000000840)=""/135, 0x87}, {&(0x7f0000000900)=""/123, 0x7b}], 0x5, &(0x7f0000000a00)=""/78, 0x4e}, 0x9}], 0x3, 0x2101, &(0x7f0000000b40)) setsockopt$inet_tcp_int(r4, 0x6, 0x4, &(0x7f0000000b80)=0x3, 0x4) r5 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f00000000c0)) 17:06:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x700, 0x6}]}, 0x1c}}, 0x0) 17:06:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, 0x0) r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 417.541925] team0: Cannot enslave team device to itself [ 417.548753] batman_adv: batadv0: Adding interface: team0 [ 417.554238] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 417.579948] batman_adv: batadv0: Interface activated: team0 17:06:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x900, 0x6}]}, 0x1c}}, 0x0) 17:06:17 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x0, 0x0}) 17:06:17 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x600000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 417.668218] batman_adv: batadv0: Interface deactivated: team0 [ 417.694079] batman_adv: batadv0: Removing interface: team0 17:06:17 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000040)={0x49, 0x0, 0x7, 0x9, 0x9, 0x81}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000080)={0x6, 0x1, 0x3, 0xfff9, 0x9}, 0xc) 17:06:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, 0x0) r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 417.757795] team0: Cannot enslave team device to itself 17:06:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x10, 0x6}]}, 0x1c}}, 0x0) [ 417.803221] batman_adv: batadv0: Adding interface: team0 [ 417.814863] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 417.934079] batman_adv: batadv0: Interface activated: team0 [ 417.962707] batman_adv: batadv0: Interface deactivated: team0 [ 417.973530] batman_adv: batadv0: Removing interface: team0 [ 417.989380] team0: Cannot enslave team device to itself [ 418.006964] batman_adv: batadv0: Adding interface: team0 [ 418.014136] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x4c000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0xa00, 0x6}]}, 0x1c}}, 0x0) 17:06:18 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext={0x0, 0x1}, 0x1253}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f0000000100)={{0xfc, 0x2}, 'port1\x00', 0x28, 0x148428, 0x10001, 0x8, 0x8001, 0x9, 0x1, 0x0, 0x1, 0x1}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 17:06:18 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x700000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xe000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x0, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 418.040660] batman_adv: batadv0: Interface activated: team0 17:06:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0xb00, 0x6}]}, 0x1c}}, 0x0) [ 418.139466] batman_adv: batadv0: Interface deactivated: team0 [ 418.163585] batman_adv: batadv0: Removing interface: team0 17:06:18 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00'}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) 17:06:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x0, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:18 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x800000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 418.191664] team0: Cannot enslave team device to itself [ 418.200760] batman_adv: batadv0: Interface deactivated: team0 [ 418.206911] batman_adv: batadv0: Removing interface: team0 [ 418.221588] team0: Cannot enslave team device to itself [ 418.230435] batman_adv: batadv0: Adding interface: team0 [ 418.249703] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:18 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x900000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0xc00, 0x6}]}, 0x1c}}, 0x0) [ 418.361206] batman_adv: batadv0: Interface activated: team0 [ 418.390577] batman_adv: batadv0: Adding interface: team0 [ 418.396083] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 418.421942] batman_adv: batadv0: Interface activated: team0 [ 418.434952] batman_adv: batadv0: Interface deactivated: team0 [ 418.451855] batman_adv: batadv0: Removing interface: team0 [ 418.483584] team0: Cannot enslave team device to itself [ 418.505575] batman_adv: batadv0: Adding interface: team0 17:06:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x4ff10100, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:18 executing program 5: ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000040)={@desc={0x1, 0x0, @desc4='\x85\xba\xa1t\xf0\xcb\x11B'}}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 17:06:18 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xa00000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x0, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0xd00, 0x6}]}, 0x1c}}, 0x0) 17:06:18 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) r1 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)) [ 418.515172] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 418.550142] batman_adv: batadv0: Interface activated: team0 17:06:18 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x4000000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0xe00, 0x6}]}, 0x1c}}, 0x0) [ 418.636894] batman_adv: batadv0: Interface deactivated: team0 [ 418.649283] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 418.668941] batman_adv: batadv0: Removing interface: team0 17:06:18 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x1f, 0x9}, 0x90) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) [ 418.720732] team0: Cannot enslave team device to itself [ 418.750011] batman_adv: batadv0: Adding interface: team0 [ 418.751759] EXT4-fs (loop1): get root inode failed [ 418.755516] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 418.755529] batman_adv: batadv0: Interface activated: team0 [ 418.795711] batman_adv: batadv0: Interface deactivated: team0 17:06:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = mq_open(&(0x7f0000000400)='\x00', 0x800, 0x30, &(0x7f0000000440)={0xfffffffffffffffc, 0xf7e, 0x100000001, 0x5}) mq_timedreceive(r1, &(0x7f0000000480)=""/19, 0x13, 0x2, &(0x7f00000004c0)={0x77359400}) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, 0x0, 0x429, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x3ff, 0x6}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x2}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x2}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x2}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x14084) r3 = dup(r2) sendfile(r3, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x6b12eeab, 0x6, 0x1], 0x3, 0x0, 0x0, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r6 = socket$inet(0x10, 0x2, 0x0) r7 = dup(r6) sendfile(r7, r5, &(0x7f0000000040)=0x103000, 0x8001) sendmsg$NFNL_MSG_ACCT_GET(r5, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8080080}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xc0, 0x1, 0x7, 0x301, 0x0, 0x0, {0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x80000000}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x101}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xf7}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x4}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x8}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x8fd4}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FILTER={0x3c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xfffffff8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x800}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfffffffc}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xffffff7f}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000000}, 0x26004000) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x1020, 0xf82e, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x1, r4, 0x0) r8 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r8, 0xc00c642e, &(0x7f00000000c0)) [ 418.816044] batman_adv: batadv0: Removing interface: team0 [ 418.835480] EXT4-fs (loop1): mount failed 17:06:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x10, 0x2, 0x0) r5 = dup(0xffffffffffffffff) sendfile(r5, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0xf00, 0x6}]}, 0x1c}}, 0x0) [ 418.872843] team0: Cannot enslave team device to itself [ 418.924354] batman_adv: batadv0: Adding interface: team0 [ 418.936984] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x50f10100, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:19 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xf5ffffff00000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:19 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000080)={0x0, 0x2}) umount2(&(0x7f0000000040)='./file0\x00', 0x2) 17:06:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1100, 0x6}]}, 0x1c}}, 0x0) 17:06:19 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) r1 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)) [ 419.008316] batman_adv: batadv0: Interface activated: team0 17:06:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x10, 0x2, 0x0) r5 = dup(0xffffffffffffffff) sendfile(r5, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 419.129337] batman_adv: batadv0: Interface deactivated: team0 [ 419.145072] batman_adv: batadv0: Removing interface: team0 17:06:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1200, 0x6}]}, 0x1c}}, 0x0) 17:06:19 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') [ 419.165274] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) 17:06:19 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xfc00000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 419.225244] team0: Cannot enslave team device to itself [ 419.249296] batman_adv: batadv0: Adding interface: team0 [ 419.251615] EXT4-fs (loop1): get root inode failed [ 419.254789] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 419.254805] batman_adv: batadv0: Interface activated: team0 17:06:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x51f10100, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1300, 0x6}]}, 0x1c}}, 0x0) 17:06:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x10, 0x2, 0x0) r5 = dup(0xffffffffffffffff) sendfile(r5, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:19 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x6, 0x40, 0x5b}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) 17:06:19 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xfe80000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 419.412020] batman_adv: batadv0: Interface deactivated: team0 [ 419.441884] batman_adv: batadv0: Removing interface: team0 17:06:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1400, 0x6}]}, 0x1c}}, 0x0) 17:06:19 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x600, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 419.467196] EXT4-fs (loop1): mount failed [ 419.478276] team0: Cannot enslave team device to itself [ 419.511948] batman_adv: batadv0: Adding interface: team0 [ 419.517449] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:19 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) r1 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)) 17:06:19 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xfec0000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1500, 0x6}]}, 0x1c}}, 0x0) [ 419.585755] batman_adv: batadv0: Interface activated: team0 17:06:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) dup(r5) sendfile(0xffffffffffffffff, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x60000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 419.652853] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:06:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1600, 0x6}]}, 0x1c}}, 0x0) 17:06:19 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xff00000000000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 419.740358] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 419.775608] batman_adv: batadv0: Interface deactivated: team0 17:06:20 executing program 5 (fault-call:2 fault-nth:0): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 419.791650] batman_adv: batadv0: Removing interface: team0 [ 419.802484] EXT4-fs (loop1): get root inode failed [ 419.821905] team0: Cannot enslave team device to itself [ 419.827725] EXT4-fs (loop1): mount failed 17:06:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) dup(r5) sendfile(0xffffffffffffffff, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 419.845609] batman_adv: batadv0: Adding interface: team0 17:06:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1700, 0x6}]}, 0x1c}}, 0x0) [ 419.877965] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:20 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0xffffffff00000000, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:20 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) r1 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) 17:06:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1800, 0x6}]}, 0x1c}}, 0x0) [ 420.008282] batman_adv: batadv0: Interface activated: team0 [ 420.039838] batman_adv: batadv0: Interface deactivated: team0 [ 420.048241] batman_adv: batadv0: Removing interface: team0 [ 420.093827] team0: Cannot enslave team device to itself [ 420.119295] batman_adv: batadv0: Adding interface: team0 17:06:20 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0x2, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0x2, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 420.124793] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 420.199703] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 420.222177] batman_adv: batadv0: Interface activated: team0 [ 420.242906] EXT4-fs (loop1): get root inode failed 17:06:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x65580000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) dup(r5) sendfile(0xffffffffffffffff, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1900, 0x6}]}, 0x1c}}, 0x0) 17:06:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0x5421, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 420.265783] EXT4-fs (loop1): mount failed 17:06:20 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:06:20 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) r1 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) 17:06:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1a00, 0x6}]}, 0x1c}}, 0x0) 17:06:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0x5450, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 420.417296] batman_adv: batadv0: Interface deactivated: team0 [ 420.435028] batman_adv: batadv0: Removing interface: team0 [ 420.455004] team0: Cannot enslave team device to itself 17:06:20 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x2, @loopback}, 0x1c) [ 420.491799] batman_adv: batadv0: Adding interface: team0 [ 420.508173] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) 17:06:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1b00, 0x6}]}, 0x1c}}, 0x0) [ 420.538148] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 420.558096] EXT4-fs (loop1): get root inode failed 17:06:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0x5451, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:20 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x3, @loopback}, 0x1c) [ 420.617063] EXT4-fs (loop1): mount failed [ 420.653369] batman_adv: batadv0: Interface activated: team0 [ 420.666259] batman_adv: batadv0: Interface deactivated: team0 [ 420.674218] batman_adv: batadv0: Removing interface: team0 [ 420.709227] team0: Cannot enslave team device to itself 17:06:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x68000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000040)=0x103000, 0x8001) 17:06:21 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) r1 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:06:21 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x4, @loopback}, 0x1c) 17:06:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1c00, 0x6}]}, 0x1c}}, 0x0) 17:06:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0x5452, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 420.757202] batman_adv: batadv0: Adding interface: team0 [ 420.772786] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 420.799154] batman_adv: batadv0: Interface activated: team0 [ 420.933270] batman_adv: batadv0: Interface deactivated: team0 [ 420.940589] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 420.965875] batman_adv: batadv0: Removing interface: team0 17:06:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1d00, 0x6}]}, 0x1c}}, 0x0) 17:06:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0x5460, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:21 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x5, @loopback}, 0x1c) [ 420.981088] team0: Cannot enslave team device to itself [ 420.987821] batman_adv: batadv0: Adding interface: team0 [ 420.993303] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 421.023075] EXT4-fs (loop1): get root inode failed 17:06:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000040)=0x103000, 0x8001) [ 421.033853] EXT4-fs (loop1): mount failed [ 421.039609] batman_adv: batadv0: Interface activated: team0 [ 421.052447] batman_adv: batadv0: Interface deactivated: team0 [ 421.060859] batman_adv: batadv0: Removing interface: team0 [ 421.094818] team0: Cannot enslave team device to itself [ 421.120158] batman_adv: batadv0: Adding interface: team0 17:06:21 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) r1 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 421.125667] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1e00, 0x6}]}, 0x1c}}, 0x0) 17:06:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x6c000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0x40049409, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 421.182138] batman_adv: batadv0: Interface activated: team0 17:06:21 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @loopback}, 0x1c) 17:06:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1f00, 0x6}]}, 0x1c}}, 0x0) [ 421.273682] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 421.303475] validate_nla: 36 callbacks suppressed [ 421.303485] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:06:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0x4020940d, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000040)=0x103000, 0x8001) [ 421.332924] batman_adv: batadv0: Interface deactivated: team0 [ 421.351307] batman_adv: batadv0: Removing interface: team0 [ 421.359402] EXT4-fs (loop1): get root inode failed [ 421.366778] EXT4-fs (loop1): mount failed [ 421.382586] team0: Cannot enslave team device to itself 17:06:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2000, 0x6}]}, 0x1c}}, 0x0) 17:06:21 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) [ 421.404026] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 421.415330] batman_adv: batadv0: Adding interface: team0 [ 421.429980] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0045878, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:21 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) r1 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 421.490113] batman_adv: batadv0: Interface activated: team0 [ 421.515484] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 421.530007] batman_adv: batadv0: Interface deactivated: team0 [ 421.549585] batman_adv: batadv0: Removing interface: team0 [ 421.578470] team0: Cannot enslave team device to itself 17:06:21 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) 17:06:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2100, 0x6}]}, 0x1c}}, 0x0) [ 421.602487] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 421.632303] batman_adv: batadv0: Adding interface: team0 [ 421.662069] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 421.713161] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) 17:06:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x74000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, 0x0, 0x8001) 17:06:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0045878, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2200, 0x6}]}, 0x1c}}, 0x0) 17:06:22 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x9, @loopback}, 0x1c) [ 421.754122] batman_adv: batadv0: Interface activated: team0 [ 421.782805] EXT4-fs (loop1): get root inode failed [ 421.791005] EXT4-fs (loop1): mount failed 17:06:22 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) 17:06:22 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xa, @loopback}, 0x1c) 17:06:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2300, 0x6}]}, 0x1c}}, 0x0) 17:06:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc01064c9, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, 0x0, 0x8001) [ 421.942346] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 422.009261] batman_adv: batadv0: Interface deactivated: team0 [ 422.045290] batman_adv: batadv0: Removing interface: team0 [ 422.057129] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) 17:06:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0189436, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:22 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xfc, @loopback}, 0x1c) [ 422.106311] team0: Cannot enslave team device to itself [ 422.125555] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 422.139376] batman_adv: batadv0: Adding interface: team0 [ 422.147216] EXT4-fs (loop1): get root inode failed [ 422.165856] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.194280] EXT4-fs (loop1): mount failed [ 422.216196] batman_adv: batadv0: Interface activated: team0 [ 422.240655] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 422.260042] batman_adv: batadv0: Interface deactivated: team0 [ 422.276840] batman_adv: batadv0: Removing interface: team0 [ 422.296752] team0: Cannot enslave team device to itself [ 422.302424] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 422.322295] batman_adv: batadv0: Adding interface: team0 [ 422.339376] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.371759] batman_adv: batadv0: Interface activated: team0 17:06:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x7a000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2400, 0x6}]}, 0x1c}}, 0x0) 17:06:22 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x300, @loopback}, 0x1c) 17:06:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc020660b, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, 0x0, 0x8001) 17:06:22 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) 17:06:22 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x500, @loopback}, 0x1c) 17:06:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2500, 0x6}]}, 0x1c}}, 0x0) [ 422.469909] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 17:06:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f0000000040)={0x6, 0x1}) [ 422.513167] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) 17:06:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040), 0x8001) 17:06:22 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x600, @loopback}, 0x1c) [ 422.558545] EXT4-fs (loop1): get root inode failed [ 422.565890] EXT4-fs (loop1): mount failed [ 422.575982] batman_adv: batadv0: Interface deactivated: team0 [ 422.611828] batman_adv: batadv0: Removing interface: team0 17:06:22 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) [ 422.654160] team0: Cannot enslave team device to itself [ 422.697951] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 422.718004] batman_adv: batadv0: Adding interface: team0 [ 422.733588] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 422.733746] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.753165] EXT4-fs (loop1): get root inode failed [ 422.786901] EXT4-fs (loop1): mount failed 17:06:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x81000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040), 0x8001) 17:06:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x8000, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x29, 0x1f, 0x3, 0xffffffff, 0x24, @private1={0xfc, 0x1, [], 0x1}, @local, 0x8, 0x80, 0xffffffff, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'sit0\x00', r1, 0x2f, 0x20, 0xc5, 0x1, 0x20, @private2, @mcast2, 0x40, 0x10040, 0x7, 0xfce3}}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:23 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x700, @loopback}, 0x1c) 17:06:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2600, 0x6}]}, 0x1c}}, 0x0) 17:06:23 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) [ 422.812046] batman_adv: batadv0: Interface activated: team0 17:06:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2700, 0x6}]}, 0x1c}}, 0x0) [ 422.926760] batman_adv: batadv0: Interface deactivated: team0 [ 422.947348] batman_adv: batadv0: Removing interface: team0 17:06:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000003c0)={0x100000000, 0x80000000, 0x1, 0x0, 0x0, [{{r1}, 0x10000}]}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0xc) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r3, &(0x7f0000000280)="6112708d658414fbd55986b8755bec463c904c339869b219d9ee298369dae52c4356df", &(0x7f00000002c0)=""/189}, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x1ff, 0x20d, 0x8a, 0x7fff, r2}, &(0x7f0000000100)=0x10) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x110) getsockopt$ARPT_SO_GET_REVISION_TARGET(r6, 0x0, 0x63, &(0x7f0000000200)={'ipvs\x00'}, &(0x7f0000000240)=0x1e) 17:06:23 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x900, @loopback}, 0x1c) [ 422.962001] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 422.991640] team0: Cannot enslave team device to itself [ 422.998541] batman_adv: batadv0: Adding interface: team0 [ 423.004028] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 423.039371] EXT4-fs (loop1): get root inode failed 17:06:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2800, 0x6}]}, 0x1c}}, 0x0) [ 423.079324] EXT4-fs (loop1): mount failed 17:06:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040), 0x8001) 17:06:23 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xa00, @loopback}, 0x1c) [ 423.116978] batman_adv: batadv0: Interface activated: team0 17:06:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x88a8ffff, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f00000000c0)={0x1000, 0x6, {0x0}, {}, 0x59ee, 0xfffffffffffffb37}) rt_tgsigqueueinfo(0xffffffffffffffff, r4, 0x2b, &(0x7f00000001c0)={0x2d, 0x80000000, 0xde6f}) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040), 0x8) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:23 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) 17:06:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2900, 0x6}]}, 0x1c}}, 0x0) 17:06:23 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x4000, @loopback}, 0x1c) [ 423.280347] batman_adv: batadv0: Interface deactivated: team0 [ 423.308915] batman_adv: batadv0: Removing interface: team0 17:06:23 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x80fe, @loopback}, 0x1c) 17:06:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x0) [ 423.347621] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 423.373501] team0: Cannot enslave team device to itself 17:06:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xfffffffffffffffd, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0xc395b77599a96e59, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x10000008}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000140)=""/144) r3 = socket$inet(0x10, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x2f, 0x40, 0x7, 0x3f, 0x50, @empty, @private1, 0x1, 0x7800, 0x3, 0x7ff}}) ioctl$SIOCX25SENDCALLACCPT(r6, 0x89e9) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) r7 = dup(r3) sendfile(r7, r2, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_GET_UNIQUE(r7, 0xc0106401, &(0x7f00000000c0)={0xc, &(0x7f0000000100)=""/46}) 17:06:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2a00, 0x6}]}, 0x1c}}, 0x0) [ 423.410923] batman_adv: batadv0: Adding interface: team0 [ 423.416428] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 423.447672] EXT4-fs (loop1): get root inode failed [ 423.453121] EXT4-fs (loop1): mount failed 17:06:23 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) [ 423.536306] batman_adv: batadv0: Interface activated: team0 [ 423.571121] batman_adv: batadv0: Interface deactivated: team0 17:06:23 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xc0fe, @loopback}, 0x1c) 17:06:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x408000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x5, 0x7d, 0x1f}}, 0x30) [ 423.586141] batman_adv: batadv0: Removing interface: team0 [ 423.655154] team0: Cannot enslave team device to itself [ 423.674994] batman_adv: batadv0: Adding interface: team0 17:06:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x0) 17:06:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2b00, 0x6}]}, 0x1c}}, 0x0) 17:06:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) ioctl$IOCTL_VMCI_QUEUEPAIR_SETPF(0xffffffffffffffff, 0x7a9, &(0x7f0000000040)={{@host, 0xffff}, 0xf800000000000, 0x7, 0xffffffff, 0x6, 0x2, 0x0, 0x1, 0x3ff}) 17:06:23 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xfc00, @loopback}, 0x1c) 17:06:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xc3ffffff, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 423.686540] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 423.715671] batman_adv: batadv0: Interface activated: team0 [ 423.784405] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 423.850258] EXT4-fs (loop1): get root inode failed [ 423.863014] batman_adv: batadv0: Interface deactivated: team0 [ 423.876104] EXT4-fs (loop1): mount failed 17:06:24 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xfe80, @loopback}, 0x1c) 17:06:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x448000, 0x0) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="00042cbd7000fddbdf25410000000e0001006e657464657673696d0000000f0002003a18a7a0657673696d3000000d0087006c325f64726f707300000000000001006e657464657673696d000000000002006e657464657673696d3000000d0087006c325f64726f000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000082097039468e0261c2e05f05ad9a882e6b5ec5cfe91235a9a28e6f9fec4088d97136f38935317abfd0c71b70e90c03222"], 0xa0}, 0x1, 0x0, 0x0, 0x44000051}, 0x10) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) socket$inet6_sctp(0xa, 0x0, 0x84) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r6, 0xc03064b7, &(0x7f0000000100)={0x0, 0x2, 0x7b, 0xff, 0x0, 0x0, 0x85b4, 0x4, 0x8, 0x7, 0x8, 0x7fffffff}) r7 = dup(0xffffffffffffffff) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000040)=0x103000, 0x8001) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000280)={0x8, 0x8001, 0x100, 0xae2}, 0x10) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="04d90000", @ANYRES32=0x0], &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r6, 0x84, 0x83, &(0x7f00000002c0)={r9, 0x200}, 0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000040)={r9, 0x10, 0x1}, 0x8) [ 423.897540] batman_adv: batadv0: Removing interface: team0 17:06:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2c00, 0x6}]}, 0x1c}}, 0x0) [ 423.930296] team0: Cannot enslave team device to itself [ 423.962759] batman_adv: batadv0: Adding interface: team0 17:06:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x0) 17:06:24 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) [ 423.973067] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:24 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xfec0, @loopback}, 0x1c) 17:06:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2d00, 0x6}]}, 0x1c}}, 0x0) [ 424.109448] batman_adv: batadv0: Interface activated: team0 [ 424.116702] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 424.156764] batman_adv: batadv0: Interface deactivated: team0 [ 424.172548] batman_adv: batadv0: Removing interface: team0 17:06:24 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xff00, @loopback}, 0x1c) 17:06:24 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000180)={0x27, &(0x7f0000000140)=""/39}) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0xfffffffffffffffd, 0x8801) ioctl$DRM_IOCTL_MODE_CURSOR2(r1, 0xc02464bb, &(0x7f00000000c0)={0x1, 0xfffffffe, 0x400, 0x5, 0x80000001, 0x9, 0x3, 0x7, 0x5}) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x8}, 0x16, 0x2) [ 424.219434] team0: Cannot enslave team device to itself [ 424.225295] EXT4-fs (loop1): get root inode failed [ 424.237171] EXT4-fs (loop1): mount failed [ 424.245594] batman_adv: batadv0: Adding interface: team0 17:06:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2e00, 0x6}]}, 0x1c}}, 0x0) [ 424.271783] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:24 executing program 0 (fault-call:10 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xe4ffffff, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:24 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) 17:06:24 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x1000000, @loopback}, 0x1c) 17:06:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x20400, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000040)={0x2e, &(0x7f0000000140)=""/46}) 17:06:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2f00, 0x6}]}, 0x1c}}, 0x0) [ 424.391578] batman_adv: batadv0: Interface activated: team0 [ 424.486404] FAULT_INJECTION: forcing a failure. [ 424.486404] name failslab, interval 1, probability 0, space 0, times 0 [ 424.513743] batman_adv: batadv0: Interface deactivated: team0 [ 424.522679] CPU: 0 PID: 23020 Comm: syz-executor.0 Not tainted 4.19.163-syzkaller #0 [ 424.530629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.539989] Call Trace: [ 424.542331] batman_adv: batadv0: Removing interface: team0 [ 424.542586] dump_stack+0x1fc/0x2fe [ 424.551829] should_fail.cold+0xa/0x14 [ 424.555743] ? setup_fault_attr+0x200/0x200 [ 424.560073] ? lock_acquire+0x170/0x3c0 [ 424.564068] __should_failslab+0x115/0x180 [ 424.568309] should_failslab+0x5/0xf [ 424.572014] kmem_cache_alloc_trace+0x284/0x380 [ 424.576672] ? __might_fault+0x192/0x1d0 [ 424.580756] alloc_pipe_info+0xb8/0x470 [ 424.584724] splice_direct_to_actor+0x6dd/0x8d0 [ 424.589390] ? apparmor_getprocattr+0x11d0/0x11d0 [ 424.594306] ? check_preemption_disabled+0x41/0x280 [ 424.599423] ? generic_pipe_buf_nosteal+0x10/0x10 [ 424.604258] ? do_splice_to+0x160/0x160 [ 424.608224] ? security_file_permission+0x1c0/0x220 [ 424.613234] do_splice_direct+0x1a7/0x270 [ 424.617383] ? splice_direct_to_actor+0x8d0/0x8d0 [ 424.622218] ? security_file_permission+0x1c0/0x220 [ 424.627228] do_sendfile+0x550/0xc30 [ 424.630958] ? do_compat_pwritev64+0x1b0/0x1b0 [ 424.635530] ? __might_fault+0x192/0x1d0 [ 424.639583] __se_sys_sendfile64+0xc4/0x160 [ 424.643891] ? __se_sys_sendfile+0x180/0x180 [ 424.648288] ? trace_hardirqs_off_caller+0x6e/0x210 [ 424.653292] ? do_syscall_64+0x21/0x620 [ 424.657256] do_syscall_64+0xf9/0x620 [ 424.661052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.666227] RIP: 0033:0x45e149 [ 424.669411] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.688297] RSP: 002b:00007f3c6d376c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 424.695998] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 000000000045e149 [ 424.703253] RDX: 0000000020000040 RSI: 0000000000000008 RDI: 000000000000000a [ 424.710511] RBP: 00007f3c6d376ca0 R08: 0000000000000000 R09: 0000000000000000 [ 424.717766] R10: 0000000000008001 R11: 0000000000000246 R12: 0000000000000000 [ 424.725020] R13: 00007ffcd91c07ef R14: 00007f3c6d3779c0 R15: 000000000119c034 17:06:24 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x2000000, @loopback}, 0x1c) 17:06:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3000, 0x6}]}, 0x1c}}, 0x0) [ 424.740262] team0: Cannot enslave team device to itself [ 424.752159] batman_adv: batadv0: Adding interface: team0 [ 424.759393] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000200)='/dev/input/mice\x00', 0x408000) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="040027bdf09db68f9c00"], 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x8000) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_mr_vif\x00') ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000180)={0x4, &(0x7f0000000140)=""/30}) 17:06:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3100, 0x6}]}, 0x1c}}, 0x0) [ 424.821391] batman_adv: batadv0: Interface activated: team0 [ 424.847107] batman_adv: batadv0: Interface deactivated: team0 [ 424.854856] batman_adv: batadv0: Removing interface: team0 17:06:25 executing program 5: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 424.870253] team0: Cannot enslave team device to itself [ 424.877253] batman_adv: batadv0: Adding interface: team0 [ 424.882985] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:25 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x3000000, @loopback}, 0x1c) [ 424.965755] batman_adv: batadv0: Interface activated: team0 17:06:25 executing program 0 (fault-call:10 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3200, 0x6}]}, 0x1c}}, 0x0) [ 425.070514] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 425.114556] EXT4-fs (loop1): get root inode failed [ 425.127036] EXT4-fs (loop1): mount failed [ 425.151348] FAULT_INJECTION: forcing a failure. [ 425.151348] name failslab, interval 1, probability 0, space 0, times 0 [ 425.163026] CPU: 0 PID: 23062 Comm: syz-executor.0 Not tainted 4.19.163-syzkaller #0 [ 425.170905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.180277] Call Trace: [ 425.182867] dump_stack+0x1fc/0x2fe [ 425.186491] should_fail.cold+0xa/0x14 [ 425.190370] ? setup_fault_attr+0x200/0x200 [ 425.194679] ? lock_acquire+0x170/0x3c0 [ 425.198650] __should_failslab+0x115/0x180 [ 425.202872] should_failslab+0x5/0xf [ 425.206574] __kmalloc+0x2ab/0x3c0 [ 425.210103] ? alloc_pipe_info+0x193/0x470 [ 425.214350] alloc_pipe_info+0x193/0x470 [ 425.218406] splice_direct_to_actor+0x6dd/0x8d0 [ 425.223069] ? apparmor_getprocattr+0x11d0/0x11d0 [ 425.227904] ? generic_pipe_buf_nosteal+0x10/0x10 [ 425.232735] ? do_splice_to+0x160/0x160 [ 425.236696] ? security_file_permission+0x1c0/0x220 [ 425.241719] do_splice_direct+0x1a7/0x270 [ 425.245856] ? splice_direct_to_actor+0x8d0/0x8d0 [ 425.250703] ? security_file_permission+0x1c0/0x220 [ 425.255712] do_sendfile+0x550/0xc30 [ 425.259420] ? do_compat_pwritev64+0x1b0/0x1b0 [ 425.263992] ? __might_fault+0x192/0x1d0 [ 425.268043] __se_sys_sendfile64+0xc4/0x160 [ 425.272349] ? __se_sys_sendfile+0x180/0x180 [ 425.276746] ? trace_hardirqs_off_caller+0x6e/0x210 [ 425.281749] ? do_syscall_64+0x21/0x620 [ 425.285714] do_syscall_64+0xf9/0x620 [ 425.289522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.294696] RIP: 0033:0x45e149 [ 425.297875] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.316764] RSP: 002b:00007f3c6d397c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 425.324460] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 000000000045e149 [ 425.331716] RDX: 0000000020000040 RSI: 0000000000000008 RDI: 000000000000000a [ 425.338972] RBP: 00007f3c6d397ca0 R08: 0000000000000000 R09: 0000000000000000 [ 425.346227] R10: 0000000000008001 R11: 0000000000000246 R12: 0000000000000001 [ 425.353482] R13: 00007ffcd91c07ef R14: 00007f3c6d3989c0 R15: 000000000119bf8c 17:06:25 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) 17:06:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x22040, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f00000001c0)={0x1, 0x7e, 0x7, 0x1000, 0x0, 0xa7}) 17:06:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xffffa888, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:25 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x4000000, @loopback}, 0x1c) 17:06:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3300, 0x6}]}, 0x1c}}, 0x0) 17:06:25 executing program 0 (fault-call:10 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) [ 425.496179] batman_adv: batadv0: Interface deactivated: team0 [ 425.516805] batman_adv: batadv0: Removing interface: team0 17:06:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3400, 0x6}]}, 0x1c}}, 0x0) 17:06:25 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x5000000, @loopback}, 0x1c) 17:06:25 executing program 5: perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_sack\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000080)) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 425.552618] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 425.563493] team0: Cannot enslave team device to itself [ 425.616201] batman_adv: batadv0: Adding interface: team0 [ 425.626347] FAULT_INJECTION: forcing a failure. [ 425.626347] name failslab, interval 1, probability 0, space 0, times 0 [ 425.641336] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:06:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x16, 0x80) r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000040)=0x103000, 0x8001) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=@newqdisc={0x11c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xfff1, 0xffff}, {0x0, 0x5}}, [@TCA_STAB={0xf8, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x81, 0x22, 0x8, 0x401, 0x4, 0x0, 0x4, 0x1}}, {0x6, 0x2, [0x6]}}, {{0x1c, 0x1, {0x3f, 0x21, 0x3, 0x800, 0x0, 0x101, 0x7fffffff, 0x4}}, {0xc, 0x2, [0x3f, 0x8, 0x8, 0xff]}}, {{0x1c, 0x1, {0x0, 0x3f, 0x0, 0x5, 0x9dbb3e68ca58bc0c, 0x4, 0x4, 0x2}}, {0x8, 0x2, [0x6, 0x6]}}, {{0x1c, 0x1, {0x0, 0x4, 0x9, 0x9, 0x0, 0x0, 0x5, 0x5}}, {0xe, 0x2, [0x80, 0x1, 0x1, 0x5, 0x7]}}, {{0x1c, 0x1, {0x8, 0xf8, 0x7, 0x3, 0x1, 0x0, 0xbb73, 0x4}}, {0xc, 0x2, [0x4, 0x6, 0x3, 0x7]}}, {{0x1c, 0x1, {0x81, 0xaa, 0x55c9, 0xfffffe01, 0x2, 0x3, 0x1, 0x8}}, {0x14, 0x2, [0x1, 0xe6, 0x8, 0x8, 0x40, 0x4, 0x100, 0xa507]}}]}]}, 0x11c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'erspan0\x00', &(0x7f00000000c0)={'ip_vti0\x00', r9, 0x20, 0x40, 0x2, 0x3, {{0x5, 0x4, 0x3, 0x1b, 0x14, 0x68, 0x0, 0x4, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) ioctl$DRM_IOCTL_GET_UNIQUE(r3, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) arch_prctl$ARCH_SET_CPUID(0x1012, 0x6) [ 425.678085] EXT4-fs (loop1): get root inode failed [ 425.688842] CPU: 1 PID: 23081 Comm: syz-executor.0 Not tainted 4.19.163-syzkaller #0 [ 425.696751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.706112] Call Trace: [ 425.708724] dump_stack+0x1fc/0x2fe [ 425.712371] should_fail.cold+0xa/0x14 [ 425.716280] ? setup_fault_attr+0x200/0x200 [ 425.720611] ? lock_acquire+0x170/0x3c0 17:06:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3500, 0x6}]}, 0x1c}}, 0x0) [ 425.724608] __should_failslab+0x115/0x180 [ 425.728853] should_failslab+0x5/0xf [ 425.732579] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 425.737696] __kmalloc_node+0x38/0x70 [ 425.741512] kvmalloc_node+0x61/0xf0 [ 425.745240] iov_iter_get_pages_alloc+0x562/0x1150 [ 425.750193] ? kernel_text_address+0xbd/0xf0 [ 425.754616] ? iov_iter_bvec+0x130/0x130 [ 425.758692] ? lock_downgrade+0x720/0x720 [ 425.762847] ? iov_iter_pipe+0xb4/0x2c0 [ 425.766838] default_file_splice_read+0x191/0xa00 [ 425.771711] ? alloc_pipe_info+0x193/0x470 17:06:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3600, 0x6}]}, 0x1c}}, 0x0) [ 425.775956] ? do_splice_direct+0x270/0x270 [ 425.780314] ? do_syscall_64+0xf9/0x620 [ 425.784292] ? aa_path_link+0x410/0x410 [ 425.788287] ? perf_trace_lock_acquire+0x530/0x530 [ 425.793225] ? perf_trace_lock+0xe2/0x4b0 [ 425.795043] batman_adv: batadv0: Interface activated: team0 [ 425.797390] ? perf_trace_lock_acquire+0x530/0x530 [ 425.797405] ? perf_trace_lock_acquire+0x530/0x530 [ 425.797423] ? fsnotify+0x84e/0xe10 [ 425.797443] ? fsnotify_first_mark+0x200/0x200 [ 425.797458] ? lock_acquire+0x170/0x3c0 [ 425.797472] ? check_preemption_disabled+0x41/0x280 [ 425.797492] ? security_file_permission+0x1c0/0x220 [ 425.835913] ? do_splice_direct+0x270/0x270 [ 425.840260] do_splice_to+0x10e/0x160 [ 425.844074] splice_direct_to_actor+0x2b9/0x8d0 [ 425.848848] ? generic_pipe_buf_nosteal+0x10/0x10 [ 425.852266] EXT4-fs (loop1): mount failed [ 425.853699] ? do_splice_to+0x160/0x160 [ 425.853725] do_splice_direct+0x1a7/0x270 [ 425.853742] ? splice_direct_to_actor+0x8d0/0x8d0 [ 425.853764] ? security_file_permission+0x1c0/0x220 [ 425.853789] do_sendfile+0x550/0xc30 [ 425.853815] ? do_compat_pwritev64+0x1b0/0x1b0 [ 425.884392] ? __might_fault+0x192/0x1d0 [ 425.888474] __se_sys_sendfile64+0xc4/0x160 [ 425.892814] ? __se_sys_sendfile+0x180/0x180 [ 425.897243] ? trace_hardirqs_off_caller+0x6e/0x210 [ 425.902281] ? do_syscall_64+0x21/0x620 [ 425.906275] do_syscall_64+0xf9/0x620 [ 425.910095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.915294] RIP: 0033:0x45e149 [ 425.918495] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.919128] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 425.937403] RSP: 002b:00007f3c6d397c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 425.937417] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 000000000045e149 [ 425.937424] RDX: 0000000020000040 RSI: 0000000000000008 RDI: 000000000000000a [ 425.937432] RBP: 00007f3c6d397ca0 R08: 0000000000000000 R09: 0000000000000000 [ 425.937440] R10: 0000000000008001 R11: 0000000000000246 R12: 0000000000000002 [ 425.937449] R13: 00007ffcd91c07ef R14: 00007f3c6d3989c0 R15: 000000000119bf8c 17:06:26 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) 17:06:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3700, 0x6}]}, 0x1c}}, 0x0) 17:06:26 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x6000000, @loopback}, 0x1c) 17:06:26 executing program 0 (fault-call:10 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xffffff7f, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:26 executing program 5: perf_event_open(0x0, 0x0, 0x3fffffffffffffc, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x10001, 0x18001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x80000000, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x1, 0x1}, 0x0, 0x0, &(0x7f0000000380)={0x5, 0x8, 0x8001, 0x3}, &(0x7f00000003c0)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0xffffffff}}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xd, 0xa, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000060000000000000005000000036708000001000018130000b6aab5ffcf53c1acf13fc002db36e91dcd8dee40d608816cc037147fb831fd", @ANYRES32=r0, @ANYBLOB="000000000000000018000000e4e70000000000000300000015a1fffffcffffff798b1000100000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x8, 0x91, &(0x7f00000001c0)=""/145, 0x41000, 0xc, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xa, 0x8, 0xfb}, 0x10, r1, r4}, 0x78) r5 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r5, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 426.139386] batman_adv: batadv0: Interface deactivated: team0 [ 426.156444] batman_adv: batadv0: Removing interface: team0 17:06:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3800, 0x6}]}, 0x1c}}, 0x0) 17:06:26 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x7000000, @loopback}, 0x1c) [ 426.177792] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 426.210625] team0: Cannot enslave team device to itself 17:06:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000001c0)=""/4096) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="a3060369ca9e18c242c380000000"], &(0x7f0000000100)='/dev/dri/card#\x00', 0xf, 0x1) [ 426.235963] batman_adv: batadv0: Adding interface: team0 [ 426.243066] FAULT_INJECTION: forcing a failure. [ 426.243066] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 426.255535] EXT4-fs (loop1): get root inode failed [ 426.259703] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 426.272959] EXT4-fs (loop1): mount failed [ 426.315434] CPU: 0 PID: 23130 Comm: syz-executor.0 Not tainted 4.19.163-syzkaller #0 [ 426.323357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.332721] Call Trace: [ 426.335334] dump_stack+0x1fc/0x2fe [ 426.338986] should_fail.cold+0xa/0x14 [ 426.342885] ? lock_acquire+0x170/0x3c0 [ 426.346872] ? setup_fault_attr+0x200/0x200 [ 426.351217] __alloc_pages_nodemask+0x239/0x2890 [ 426.355652] batman_adv: batadv0: Interface activated: team0 [ 426.355977] ? kasan_kmalloc+0x139/0x160 [ 426.355993] ? __kmalloc_node+0x4c/0x70 [ 426.356007] ? kvmalloc_node+0x61/0xf0 [ 426.373594] ? iov_iter_get_pages_alloc+0x562/0x1150 [ 426.375753] validate_nla: 24 callbacks suppressed [ 426.375761] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 426.378699] ? default_file_splice_read+0x191/0xa00 [ 426.378710] ? do_splice_to+0x10e/0x160 [ 426.378724] ? do_sendfile+0x550/0xc30 [ 426.378736] ? __se_sys_sendfile64+0xc4/0x160 [ 426.378749] ? do_syscall_64+0xf9/0x620 [ 426.378771] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 426.378786] ? check_preemption_disabled+0x41/0x280 [ 426.378808] ? should_fail+0x142/0x7b0 [ 426.378821] ? fs_reclaim_release+0xd0/0x110 [ 426.378836] ? setup_fault_attr+0x200/0x200 [ 426.378850] ? lock_acquire+0x170/0x3c0 [ 426.378862] ? check_preemption_disabled+0x41/0x280 [ 426.378875] ? __kmalloc_node+0x38/0x70 [ 426.378893] alloc_pages_current+0x193/0x2a0 [ 426.397449] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 426.401085] ? kmem_cache_alloc_node_trace+0x351/0x3b0 17:06:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xffffffc3, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 426.401109] push_pipe+0x3e3/0x770 [ 426.469563] iov_iter_get_pages_alloc+0x5b1/0x1150 [ 426.474510] ? kernel_text_address+0xbd/0xf0 [ 426.478991] ? iov_iter_bvec+0x130/0x130 [ 426.483041] ? lock_downgrade+0x720/0x720 [ 426.487170] ? iov_iter_pipe+0xb4/0x2c0 [ 426.491155] default_file_splice_read+0x191/0xa00 [ 426.496047] ? alloc_pipe_info+0x193/0x470 [ 426.500268] ? do_splice_direct+0x270/0x270 [ 426.504593] ? do_syscall_64+0xf9/0x620 [ 426.508603] ? aa_path_link+0x410/0x410 [ 426.512586] ? perf_trace_lock_acquire+0x530/0x530 [ 426.517504] ? perf_trace_lock+0xe2/0x4b0 [ 426.521636] ? perf_trace_lock_acquire+0x530/0x530 [ 426.526545] ? perf_trace_lock_acquire+0x530/0x530 [ 426.531470] ? fsnotify+0x84e/0xe10 [ 426.535091] ? fsnotify_first_mark+0x200/0x200 [ 426.539658] ? lock_acquire+0x170/0x3c0 [ 426.543624] ? check_preemption_disabled+0x41/0x280 [ 426.548655] ? security_file_permission+0x1c0/0x220 [ 426.553667] ? do_splice_direct+0x270/0x270 [ 426.557971] do_splice_to+0x10e/0x160 [ 426.561757] splice_direct_to_actor+0x2b9/0x8d0 [ 426.566410] ? generic_pipe_buf_nosteal+0x10/0x10 [ 426.571250] ? do_splice_to+0x160/0x160 [ 426.575219] do_splice_direct+0x1a7/0x270 [ 426.579352] ? splice_direct_to_actor+0x8d0/0x8d0 [ 426.584181] ? security_file_permission+0x1c0/0x220 [ 426.589201] do_sendfile+0x550/0xc30 [ 426.592927] ? do_compat_pwritev64+0x1b0/0x1b0 [ 426.597505] ? __might_fault+0x192/0x1d0 [ 426.601551] __se_sys_sendfile64+0xc4/0x160 [ 426.605854] ? __se_sys_sendfile+0x180/0x180 [ 426.610258] ? trace_hardirqs_off_caller+0x6e/0x210 [ 426.615267] ? do_syscall_64+0x21/0x620 [ 426.619227] do_syscall_64+0xf9/0x620 [ 426.623013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.628195] RIP: 0033:0x45e149 [ 426.631390] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.650416] RSP: 002b:00007f3c6d397c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 426.658119] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 000000000045e149 17:06:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3900, 0x6}]}, 0x1c}}, 0x0) 17:06:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000040)={0x2e, &(0x7f0000000140)=""/46}) [ 426.665416] RDX: 0000000020000040 RSI: 0000000000000008 RDI: 000000000000000a [ 426.672674] RBP: 00007f3c6d397ca0 R08: 0000000000000000 R09: 0000000000000000 [ 426.679935] R10: 0000000000008001 R11: 0000000000000246 R12: 0000000000000003 [ 426.687192] R13: 00007ffcd91c07ef R14: 00007f3c6d3989c0 R15: 000000000119bf8c 17:06:26 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) 17:06:26 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x8000000, @loopback}, 0x1c) 17:06:26 executing program 0 (fault-call:10 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3a00, 0x6}]}, 0x1c}}, 0x0) [ 426.813018] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 426.846815] batman_adv: batadv0: Interface deactivated: team0 17:06:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000240)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x16, 0x11, "c76c36be23c653c03ca341c69dade11887203374107dae3e621215502f48870bacf9cb0b0fb58fa0faf17b5bee967e0db371283e4522438643753a26b718a4b6", "afab6667d3075badec5878d095e06bf886d8e5e129aa06265c13e327d0ef4c77", [0x5, 0xffffffff]}) ptrace$getregset(0x4204, 0xffffffffffffffff, 0x2, &(0x7f0000000440)={&(0x7f0000000340)=""/239, 0xef}) r2 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x8000, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = signalfd(r1, &(0x7f0000000300)={[0x7fff]}, 0x8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000600)={0x800, 0x0, 0x20, {0x5}, 0x101, 0x8001}) r5 = socket$inet(0x10, 0x2, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0)='nl80211\x00') sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r4, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x68, r6, 0x800, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x8000, 0x4e}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x36}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x5}, @NL80211_ATTR_BANDS={0x8, 0xef, 0xc}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xe1}, @NL80211_ATTR_BANDS={0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x1}, @NL80211_ATTR_BANDS={0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x9}]}, 0x68}, 0x1, 0x0, 0x0, 0x20008080}, 0x8000) r7 = dup(r5) sendfile(r7, r3, &(0x7f0000000040)=0x103000, 0x8001) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000080)=0x7, 0x4) [ 426.885582] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 426.891339] batman_adv: batadv0: Removing interface: team0 17:06:27 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x9000000, @loopback}, 0x1c) 17:06:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3b00, 0x6}]}, 0x1c}}, 0x0) [ 426.979775] EXT4-fs (loop1): get root inode failed [ 426.987577] team0: Cannot enslave team device to itself [ 427.006774] FAULT_INJECTION: forcing a failure. [ 427.006774] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 427.012999] EXT4-fs (loop1): mount failed [ 427.028243] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 427.038467] batman_adv: batadv0: Adding interface: team0 [ 427.062757] CPU: 1 PID: 23186 Comm: syz-executor.0 Not tainted 4.19.163-syzkaller #0 [ 427.070686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 17:06:27 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000080)={0x2a, &(0x7f0000000040)=""/42}) [ 427.071131] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 427.080070] Call Trace: [ 427.080100] dump_stack+0x1fc/0x2fe [ 427.080123] should_fail.cold+0xa/0x14 [ 427.080139] ? lock_acquire+0x170/0x3c0 [ 427.080153] ? setup_fault_attr+0x200/0x200 [ 427.080176] __alloc_pages_nodemask+0x239/0x2890 [ 427.080194] ? kasan_kmalloc+0x139/0x160 [ 427.109297] batman_adv: batadv0: Interface activated: team0 [ 427.110765] ? __kmalloc_node+0x4c/0x70 [ 427.110780] ? kvmalloc_node+0x61/0xf0 [ 427.110795] ? iov_iter_get_pages_alloc+0x562/0x1150 [ 427.110806] ? default_file_splice_read+0x191/0xa00 [ 427.110819] ? do_splice_to+0x10e/0x160 [ 427.159474] ? do_sendfile+0x550/0xc30 [ 427.163534] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 427.168366] ? check_preemption_disabled+0x41/0x280 [ 427.173376] ? should_fail+0x142/0x7b0 [ 427.177264] ? fs_reclaim_release+0xd0/0x110 [ 427.181672] ? setup_fault_attr+0x200/0x200 [ 427.185994] ? lock_acquire+0x170/0x3c0 [ 427.189967] ? check_preemption_disabled+0x41/0x280 [ 427.194970] ? __kmalloc_node+0x38/0x70 [ 427.198937] alloc_pages_current+0x193/0x2a0 [ 427.203332] ? kmem_cache_alloc_node_trace+0x351/0x3b0 [ 427.208613] push_pipe+0x3e3/0x770 [ 427.212150] iov_iter_get_pages_alloc+0x5b1/0x1150 [ 427.217069] ? kernel_text_address+0xbd/0xf0 [ 427.221465] ? iov_iter_bvec+0x130/0x130 [ 427.225527] ? lock_downgrade+0x720/0x720 [ 427.229663] ? iov_iter_pipe+0xb4/0x2c0 [ 427.233625] default_file_splice_read+0x191/0xa00 [ 427.238462] ? alloc_pipe_info+0x193/0x470 [ 427.242682] ? do_splice_direct+0x270/0x270 [ 427.246990] ? do_syscall_64+0xf9/0x620 [ 427.250949] ? aa_path_link+0x410/0x410 [ 427.254924] ? perf_trace_lock_acquire+0x530/0x530 [ 427.259839] ? perf_trace_lock+0xe2/0x4b0 [ 427.263979] ? perf_trace_lock_acquire+0x530/0x530 [ 427.268895] ? perf_trace_lock_acquire+0x530/0x530 [ 427.273813] ? fsnotify+0x84e/0xe10 [ 427.277431] ? fsnotify_first_mark+0x200/0x200 [ 427.282000] ? lock_acquire+0x170/0x3c0 [ 427.285959] ? check_preemption_disabled+0x41/0x280 [ 427.290969] ? security_file_permission+0x1c0/0x220 [ 427.295975] ? do_splice_direct+0x270/0x270 [ 427.300284] do_splice_to+0x10e/0x160 [ 427.304072] splice_direct_to_actor+0x2b9/0x8d0 [ 427.308734] ? generic_pipe_buf_nosteal+0x10/0x10 [ 427.313564] ? do_splice_to+0x160/0x160 [ 427.317545] do_splice_direct+0x1a7/0x270 [ 427.321694] ? splice_direct_to_actor+0x8d0/0x8d0 [ 427.326526] ? security_file_permission+0x1c0/0x220 [ 427.331537] do_sendfile+0x550/0xc30 [ 427.335245] ? do_compat_pwritev64+0x1b0/0x1b0 [ 427.339818] ? __might_fault+0x192/0x1d0 [ 427.343871] __se_sys_sendfile64+0xc4/0x160 [ 427.348181] ? __se_sys_sendfile+0x180/0x180 [ 427.352577] ? trace_hardirqs_off_caller+0x6e/0x210 [ 427.357594] ? do_syscall_64+0x21/0x620 [ 427.361559] do_syscall_64+0xf9/0x620 [ 427.365363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.370553] RIP: 0033:0x45e149 [ 427.373751] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.392639] RSP: 002b:00007f3c6d355c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 427.400345] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 000000000045e149 [ 427.407601] RDX: 0000000020000040 RSI: 0000000000000008 RDI: 000000000000000a [ 427.414859] RBP: 00007f3c6d355ca0 R08: 0000000000000000 R09: 0000000000000000 [ 427.422114] R10: 0000000000008001 R11: 0000000000000246 R12: 0000000000000004 17:06:27 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xa000000, @loopback}, 0x1c) [ 427.429370] R13: 00007ffcd91c07ef R14: 00007f3c6d3569c0 R15: 000000000119c0dc [ 427.451059] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 427.518456] batman_adv: batadv0: Interface deactivated: team0 [ 427.552938] batman_adv: batadv0: Removing interface: team0 [ 427.591281] team0: Cannot enslave team device to itself [ 427.596755] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 427.608997] batman_adv: batadv0: Adding interface: team0 17:06:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xffffffe4, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3c00, 0x6}]}, 0x1c}}, 0x0) 17:06:27 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) 17:06:27 executing program 0 (fault-call:10 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:27 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x40000000, @loopback}, 0x1c) [ 427.622104] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 427.656551] batman_adv: batadv0: Interface activated: team0 17:06:27 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xf5ffffff, @loopback}, 0x1c) 17:06:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 427.788216] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 427.806929] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 427.807240] FAULT_INJECTION: forcing a failure. [ 427.807240] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:06:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3d00, 0x6}]}, 0x1c}}, 0x0) [ 427.846898] EXT4-fs (loop1): get root inode failed [ 427.855703] batman_adv: batadv0: Interface deactivated: team0 [ 427.857913] CPU: 1 PID: 23225 Comm: syz-executor.0 Not tainted 4.19.163-syzkaller #0 [ 427.869494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.877971] batman_adv: batadv0: Removing interface: team0 [ 427.878849] Call Trace: [ 427.878871] dump_stack+0x1fc/0x2fe [ 427.878890] should_fail.cold+0xa/0x14 17:06:28 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xfc000000, @loopback}, 0x1c) 17:06:28 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xfe800000, @loopback}, 0x1c) [ 427.894607] ? lock_acquire+0x170/0x3c0 [ 427.898321] EXT4-fs (loop1): mount failed [ 427.898595] ? setup_fault_attr+0x200/0x200 [ 427.898623] __alloc_pages_nodemask+0x239/0x2890 [ 427.898641] ? kasan_kmalloc+0x139/0x160 [ 427.915910] ? __kmalloc_node+0x4c/0x70 [ 427.919895] ? kvmalloc_node+0x61/0xf0 [ 427.923796] ? iov_iter_get_pages_alloc+0x562/0x1150 [ 427.928912] ? default_file_splice_read+0x191/0xa00 [ 427.933929] ? do_splice_to+0x10e/0x160 [ 427.937912] ? do_sendfile+0x550/0xc30 [ 427.941820] ? gfp_pfmemalloc_allowed+0x150/0x150 17:06:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3e00, 0x6}]}, 0x1c}}, 0x0) [ 427.946675] ? __lock_acquire+0x6de/0x3ff0 [ 427.951439] ? deref_stack_reg+0x134/0x1d0 [ 427.955678] ? deref_stack_reg+0x134/0x1d0 [ 427.959929] ? should_fail+0x142/0x7b0 [ 427.963827] ? fs_reclaim_release+0xd0/0x110 [ 427.968247] ? setup_fault_attr+0x200/0x200 [ 427.972663] ? lock_acquire+0x170/0x3c0 [ 427.976645] ? check_preemption_disabled+0x41/0x280 [ 427.981677] ? __kmalloc_node+0x38/0x70 [ 427.985668] alloc_pages_current+0x193/0x2a0 [ 427.990081] ? kmem_cache_alloc_node_trace+0x351/0x3b0 [ 427.995370] push_pipe+0x3e3/0x770 [ 427.998924] iov_iter_get_pages_alloc+0x5b1/0x1150 [ 428.003863] ? kernel_text_address+0xbd/0xf0 [ 428.008278] ? iov_iter_bvec+0x130/0x130 [ 428.012352] ? lock_downgrade+0x720/0x720 [ 428.016506] ? iov_iter_pipe+0xb4/0x2c0 [ 428.020498] default_file_splice_read+0x191/0xa00 [ 428.025364] ? alloc_pipe_info+0x193/0x470 [ 428.029605] ? do_splice_direct+0x270/0x270 [ 428.033933] ? do_syscall_64+0xf9/0x620 [ 428.037916] ? aa_path_link+0x410/0x410 [ 428.041902] ? mark_held_locks+0xf0/0xf0 [ 428.045972] ? mark_held_locks+0xf0/0xf0 [ 428.050048] ? check_preemption_disabled+0x41/0x280 [ 428.055108] ? fsnotify+0x84e/0xe10 [ 428.058783] ? fsnotify_first_mark+0x200/0x200 [ 428.063381] ? lock_acquire+0x170/0x3c0 [ 428.067368] ? check_preemption_disabled+0x41/0x280 [ 428.072400] ? security_file_permission+0x1c0/0x220 [ 428.077522] ? do_splice_direct+0x270/0x270 [ 428.081855] do_splice_to+0x10e/0x160 [ 428.085668] splice_direct_to_actor+0x2b9/0x8d0 [ 428.090356] ? generic_pipe_buf_nosteal+0x10/0x10 [ 428.095215] ? do_splice_to+0x160/0x160 [ 428.099203] do_splice_direct+0x1a7/0x270 [ 428.103358] ? splice_direct_to_actor+0x8d0/0x8d0 [ 428.108214] ? security_file_permission+0x1c0/0x220 [ 428.113237] do_sendfile+0x550/0xc30 [ 428.116943] ? do_compat_pwritev64+0x1b0/0x1b0 [ 428.121515] ? __might_fault+0x192/0x1d0 [ 428.125565] __se_sys_sendfile64+0xc4/0x160 [ 428.129873] ? __se_sys_sendfile+0x180/0x180 [ 428.134292] ? trace_hardirqs_off_caller+0x6e/0x210 [ 428.139350] ? do_syscall_64+0x21/0x620 [ 428.143313] do_syscall_64+0xf9/0x620 [ 428.147107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.152287] RIP: 0033:0x45e149 [ 428.155505] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.174480] RSP: 002b:00007f3c6d376c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 428.182183] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 000000000045e149 [ 428.189495] RDX: 0000000020000040 RSI: 0000000000000008 RDI: 000000000000000a [ 428.196803] RBP: 00007f3c6d376ca0 R08: 0000000000000000 R09: 0000000000000000 [ 428.204061] R10: 0000000000008001 R11: 0000000000000246 R12: 0000000000000005 [ 428.211315] R13: 00007ffcd91c07ef R14: 00007f3c6d3779c0 R15: 000000000119c034 [ 428.221112] team0: Cannot enslave team device to itself [ 428.226540] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 428.252862] batman_adv: batadv0: Adding interface: team0 [ 428.266058] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 428.316284] batman_adv: batadv0: Interface activated: team0 [ 428.330606] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 428.338690] batman_adv: batadv0: Interface deactivated: team0 [ 428.344649] batman_adv: batadv0: Removing interface: team0 [ 428.356701] team0: Cannot enslave team device to itself 17:06:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="0a00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:28 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xfec00000, @loopback}, 0x1c) 17:06:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x3f00, 0x6}]}, 0x1c}}, 0x0) 17:06:28 executing program 5: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:28 executing program 0 (fault-call:10 fault-nth:6): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:28 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) [ 428.362911] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 428.371613] batman_adv: batadv0: Adding interface: team0 [ 428.377076] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 428.403110] batman_adv: batadv0: Interface activated: team0 17:06:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x4000, 0x6}]}, 0x1c}}, 0x0) 17:06:28 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xff000000, @loopback}, 0x1c) [ 428.492303] batman_adv: batadv0: Interface deactivated: team0 [ 428.513762] batman_adv: batadv0: Removing interface: team0 17:06:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="0f00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:06:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f00000000c0)={0x5, @multicast}) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3f) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 428.548457] team0: Cannot enslave team device to itself [ 428.555687] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) [ 428.585950] FAULT_INJECTION: forcing a failure. [ 428.585950] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 428.637190] CPU: 0 PID: 23275 Comm: syz-executor.0 Not tainted 4.19.163-syzkaller #0 [ 428.645113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.654479] Call Trace: [ 428.657101] dump_stack+0x1fc/0x2fe [ 428.660748] should_fail.cold+0xa/0x14 [ 428.664652] ? lock_acquire+0x170/0x3c0 [ 428.668638] ? setup_fault_attr+0x200/0x200 [ 428.672986] __alloc_pages_nodemask+0x239/0x2890 [ 428.677758] ? kasan_kmalloc+0x139/0x160 [ 428.681828] ? __kmalloc_node+0x4c/0x70 [ 428.685811] ? kvmalloc_node+0x61/0xf0 [ 428.689713] ? iov_iter_get_pages_alloc+0x562/0x1150 [ 428.693723] team0: Cannot enslave team device to itself [ 428.694837] ? default_file_splice_read+0x191/0xa00 [ 428.694849] ? do_splice_to+0x10e/0x160 [ 428.694866] ? do_sendfile+0x550/0xc30 [ 428.694891] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 428.694904] ? __lock_acquire+0x6de/0x3ff0 [ 428.694915] ? deref_stack_reg+0x134/0x1d0 [ 428.694925] ? deref_stack_reg+0x134/0x1d0 [ 428.694943] ? should_fail+0x142/0x7b0 [ 428.694957] ? fs_reclaim_release+0xd0/0x110 [ 428.694972] ? setup_fault_attr+0x200/0x200 [ 428.694984] ? lock_acquire+0x170/0x3c0 [ 428.694997] ? check_preemption_disabled+0x41/0x280 [ 428.695017] ? __kmalloc_node+0x38/0x70 [ 428.695037] alloc_pages_current+0x193/0x2a0 [ 428.695050] ? kmem_cache_alloc_node_trace+0x351/0x3b0 [ 428.695068] push_pipe+0x3e3/0x770 [ 428.695089] iov_iter_get_pages_alloc+0x5b1/0x1150 [ 428.695109] ? kernel_text_address+0xbd/0xf0 [ 428.695124] ? iov_iter_bvec+0x130/0x130 [ 428.695140] ? lock_downgrade+0x720/0x720 [ 428.695151] ? iov_iter_pipe+0xb4/0x2c0 [ 428.695167] default_file_splice_read+0x191/0xa00 [ 428.695188] ? alloc_pipe_info+0x193/0x470 [ 428.695201] ? do_splice_direct+0x270/0x270 [ 428.695215] ? do_syscall_64+0xf9/0x620 [ 428.695228] ? aa_path_link+0x410/0x410 [ 428.695243] ? mark_held_locks+0xf0/0xf0 [ 428.695255] ? mark_held_locks+0xf0/0xf0 [ 428.695274] ? check_preemption_disabled+0x41/0x280 [ 428.695293] ? fsnotify+0x84e/0xe10 [ 428.695311] ? fsnotify_first_mark+0x200/0x200 [ 428.695326] ? lock_acquire+0x170/0x3c0 17:06:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="1000000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 428.783693] EXT4-fs (loop1): get root inode failed [ 428.787232] ? check_preemption_disabled+0x41/0x280 [ 428.787256] ? security_file_permission+0x1c0/0x220 [ 428.787272] ? do_splice_direct+0x270/0x270 [ 428.787285] do_splice_to+0x10e/0x160 [ 428.787300] splice_direct_to_actor+0x2b9/0x8d0 [ 428.787320] ? generic_pipe_buf_nosteal+0x10/0x10 [ 428.787335] ? do_splice_to+0x160/0x160 [ 428.787355] do_splice_direct+0x1a7/0x270 [ 428.787368] ? splice_direct_to_actor+0x8d0/0x8d0 [ 428.787385] ? security_file_permission+0x1c0/0x220 17:06:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2500000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 428.787405] do_sendfile+0x550/0xc30 [ 428.803075] EXT4-fs (loop1): mount failed [ 428.804770] ? do_compat_pwritev64+0x1b0/0x1b0 [ 428.804789] ? __might_fault+0x192/0x1d0 [ 428.804807] __se_sys_sendfile64+0xc4/0x160 [ 428.849832] team0: Cannot enslave team device to itself [ 428.852929] ? __se_sys_sendfile+0x180/0x180 [ 428.852951] ? trace_hardirqs_off_caller+0x6e/0x210 [ 428.852968] ? do_syscall_64+0x21/0x620 [ 428.852985] do_syscall_64+0xf9/0x620 [ 428.931766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.936940] RIP: 0033:0x45e149 [ 428.940128] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.959133] RSP: 002b:00007f3c6d376c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 428.966842] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 000000000045e149 [ 428.974101] RDX: 0000000020000040 RSI: 0000000000000008 RDI: 000000000000000a [ 428.981366] RBP: 00007f3c6d376ca0 R08: 0000000000000000 R09: 0000000000000000 17:06:29 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0xfffffff5, @loopback}, 0x1c) 17:06:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x4100, 0x6}]}, 0x1c}}, 0x0) 17:06:29 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r3, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 428.988628] R10: 0000000000008001 R11: 0000000000000246 R12: 0000000000000006 [ 428.995888] R13: 00007ffcd91c07ef R14: 00007f3c6d3779c0 R15: 000000000119c034 17:06:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x4200, 0x6}]}, 0x1c}}, 0x0) 17:06:29 executing program 0 (fault-call:10 fault-nth:7): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) 17:06:29 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4e31bdbf4655fdbf4655f00000000000004008000000000000800053d00000af3010404", 0x2d, 0x4400}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4677, 0x8001, 0x0, 0x9, 0x14, 0x8, "e7aa36499429065f99954dc1c5959cf9aa1a6d07a49edd25200fd5b2f63fbc1030b1e08b63beeaac4cbe275382616ee1d8b7e5b7ab43f607d5abe7cde046ee04", "b924a744f4a569cf277225a54c5fa184246e225403c1f1bf6794885501c6154da49393b35aa637263b4258fa8fa3ac1bea3b920a86dd65dc0c2820b9d06c65a3", "76e155de24f842130bad098d1ae6cc7a096e847ea08615d0fa784add5e54cf87", [0x401, 0x4]}) 17:06:29 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback={0x2}}, 0x1c) [ 429.094702] team0: Cannot enslave team device to itself 17:06:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) write$P9_RWALK(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="230000006f010002002001000000080000000000000001030000070700000000000000aee0c14b0ae8a90be0c69082c1bf5a00a377296c229698df7ea373b2e85b46448ad40b650be5bc9ff6053f2c8b51cbc13868a4b4561b8e6dcc8df308892a24cdad15fcf963d9d2769b9108a8f8e21cd05f44b84050957db7a6e31dced8ab70615f"], 0x23) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r4 = syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000400)="7912ef99a9e05312575bbb7633373f5615f8d939c306c4776edfba567ee590979db80649a90e07b21016147013964470d0e041e5a39a01b210baf3eb36b92db008159b263a756bbde0ae097c8d0b906f09162f609e90ec16c1d2dc6ad9a52b4653873d679ec7d80a9a886990f23fb91d218974f788d48f75a6b1d728dbb024da1996174c", 0x84, 0xe0}, {0xffffffffffffffff, 0x0, 0xfffffffffffffff8}], 0xe014, &(0x7f0000000280)={[{}, {'Kd#\b'}, {'/dev/dri/card#\x00'}, {'\xc2\xed-($}^\\}'}, {'/dev/dri/card#\x00'}], [{@appraise='appraise'}, {@smackfsroot={'smackfsroot', 0x3d, ':'}}, {@obj_type={'obj_type', 0x3d, '\xe3%{'}}, {@obj_role={'obj_role', 0x3d, '/dev/dri/card#\x00'}}, {@obj_role={'obj_role'}}]}) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000340)="69d6464bb5a6b006772c6b38763bd4b4a9f5677ccf047ff3db92400baf3e65935095f90c74543731d1a409f03314569dbbb95ff83771c84b31c2d538dfe34f33ccb90a62279a59e31f07e5353d695e2ea613f9daa57147331080c4404998430e6e574a412607ddcc4307aacf2e853c8efa3ee33f64fa3b7eb34f86e91a4174bcdd9061fedc53e1901f452a5173814181d54525d3537f21087263aa72ccb313a37e502ccc28db747911bbe2ca3f0bc0936c52458e5346e2860255", 0xba}], 0x1, 0x3) ioctl$DRM_IOCTL_GET_UNIQUE(r3, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) [ 429.149741] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 429.189798] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. 17:06:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x4300, 0x6}]}, 0x1c}}, 0x0) [ 429.218125] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 429.244088] EXT4-fs error (device loop1): ext4_ext_check_inode:498: inode #2: comm syz-executor.1: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 1025, max 4(4), depth 0(0) 17:06:29 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback={0x3}}, 0x1c) 17:06:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="3c00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 429.316020] EXT4-fs (loop1): get root inode failed [ 429.327934] FAULT_INJECTION: forcing a failure. [ 429.327934] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 429.346693] EXT4-fs (loop1): mount failed [ 429.352859] CPU: 0 PID: 23318 Comm: syz-executor.0 Not tainted 4.19.163-syzkaller #0 [ 429.360762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.370127] Call Trace: [ 429.372730] dump_stack+0x1fc/0x2fe [ 429.376376] should_fail.cold+0xa/0x14 [ 429.380279] ? lock_acquire+0x170/0x3c0 [ 429.384268] ? setup_fault_attr+0x200/0x200 [ 429.388616] __alloc_pages_nodemask+0x239/0x2890 [ 429.393381] ? kasan_kmalloc+0x139/0x160 [ 429.397452] ? __kmalloc_node+0x4c/0x70 [ 429.401433] ? kvmalloc_node+0x61/0xf0 [ 429.405330] ? iov_iter_get_pages_alloc+0x562/0x1150 [ 429.410440] ? default_file_splice_read+0x191/0xa00 [ 429.415467] ? do_splice_to+0x10e/0x160 [ 429.419451] ? do_sendfile+0x550/0xc30 [ 429.423355] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 429.428210] ? __lock_acquire+0x6de/0x3ff0 [ 429.432452] ? deref_stack_reg+0x134/0x1d0 [ 429.436691] ? deref_stack_reg+0x134/0x1d0 [ 429.440945] ? should_fail+0x142/0x7b0 [ 429.444849] ? fs_reclaim_release+0xd0/0x110 [ 429.449267] ? setup_fault_attr+0x200/0x200 [ 429.454032] ? lock_acquire+0x170/0x3c0 [ 429.458017] ? check_preemption_disabled+0x41/0x280 [ 429.463045] ? __kmalloc_node+0x38/0x70 [ 429.467036] alloc_pages_current+0x193/0x2a0 [ 429.471453] ? kmem_cache_alloc_node_trace+0x351/0x3b0 [ 429.476745] push_pipe+0x3e3/0x770 [ 429.480304] iov_iter_get_pages_alloc+0x5b1/0x1150 [ 429.485255] ? kernel_text_address+0xbd/0xf0 [ 429.489683] ? iov_iter_bvec+0x130/0x130 [ 429.493762] ? lock_downgrade+0x720/0x720 [ 429.497915] ? iov_iter_pipe+0xb4/0x2c0 [ 429.501926] default_file_splice_read+0x191/0xa00 [ 429.504044] team0: Cannot enslave team device to itself [ 429.506785] ? alloc_pipe_info+0x193/0x470 17:06:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="5300000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0014000000008000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 429.506801] ? do_splice_direct+0x270/0x270 [ 429.506814] ? do_syscall_64+0xf9/0x620 [ 429.506829] ? aa_path_link+0x410/0x410 [ 429.528682] ? mark_held_locks+0xf0/0xf0 [ 429.532749] ? mark_held_locks+0xf0/0xf0 [ 429.536824] ? check_preemption_disabled+0x41/0x280 [ 429.541857] ? fsnotify+0x84e/0xe10 [ 429.545500] ? fsnotify_first_mark+0x200/0x200 [ 429.550096] ? lock_acquire+0x170/0x3c0 [ 429.554076] ? check_preemption_disabled+0x41/0x280 [ 429.559109] ? security_file_permission+0x1c0/0x220 [ 429.564153] ? do_splice_direct+0x270/0x270 [ 429.568487] do_splice_to+0x10e/0x160 [ 429.572293] splice_direct_to_actor+0x2b9/0x8d0 [ 429.576981] ? generic_pipe_buf_nosteal+0x10/0x10 [ 429.578598] ------------[ cut here ]------------ [ 429.581829] ? do_splice_to+0x160/0x160 [ 429.581849] do_splice_direct+0x1a7/0x270 [ 429.581863] ? splice_direct_to_actor+0x8d0/0x8d0 [ 429.581883] ? security_file_permission+0x1c0/0x220 [ 429.596629] WARNING: CPU: 1 PID: 536 at net/batman-adv/bat_iv_ogm.c:597 batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 429.599741] do_sendfile+0x550/0xc30 [ 429.604728] Kernel panic - not syncing: panic_on_warn set ... [ 429.604728] [ 429.616432] ? do_compat_pwritev64+0x1b0/0x1b0 [ 429.632112] ? __might_fault+0x192/0x1d0 [ 429.636163] __se_sys_sendfile64+0xc4/0x160 [ 429.640473] ? __se_sys_sendfile+0x180/0x180 [ 429.644870] ? trace_hardirqs_off_caller+0x6e/0x210 [ 429.649874] ? do_syscall_64+0x21/0x620 [ 429.653842] do_syscall_64+0xf9/0x620 [ 429.657694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.662872] RIP: 0033:0x45e149 [ 429.666054] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 429.685027] RSP: 002b:00007f3c6d397c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 429.692746] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 000000000045e149 [ 429.700003] RDX: 0000000020000040 RSI: 0000000000000008 RDI: 000000000000000a [ 429.707284] RBP: 00007f3c6d397ca0 R08: 0000000000000000 R09: 0000000000000000 [ 429.714539] R10: 0000000000008001 R11: 0000000000000246 R12: 0000000000000007 [ 429.721792] R13: 00007ffcd91c07ef R14: 00007f3c6d3989c0 R15: 000000000119bf8c [ 429.729069] CPU: 1 PID: 536 Comm: kworker/u4:3 Not tainted 4.19.163-syzkaller #0 [ 429.736605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.745975] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 429.753076] Call Trace: [ 429.755681] dump_stack+0x1fc/0x2fe [ 429.759323] panic+0x26a/0x50e [ 429.762521] ? __warn_printk+0xf3/0xf3 [ 429.766428] ? batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 429.773188] ? __probe_kernel_read+0x130/0x1b0 [ 429.777781] ? __warn.cold+0x5/0x61 [ 429.781416] ? __warn+0xe4/0x200 [ 429.784813] ? batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 429.791575] __warn.cold+0x20/0x61 [ 429.795170] ? io_schedule_timeout+0x140/0x140 [ 429.799761] ? batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 429.806521] report_bug+0x262/0x2b0 [ 429.810160] do_error_trap+0x1d7/0x310 [ 429.814061] ? math_error+0x310/0x310 17:06:29 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback={0x4}}, 0x1c) 17:06:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x4400, 0x6}]}, 0x1c}}, 0x0) 17:06:29 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0x2e, &(0x7f0000000140)=""/46}) 17:06:30 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x2000007b, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback={0x5}}, 0x1c) [ 429.817874] ? __irq_work_queue_local+0x101/0x160 [ 429.822727] ? irq_work_queue+0x29/0x80 [ 429.826706] ? error_entry+0x72/0xd0 [ 429.830430] ? trace_hardirqs_off_caller+0x6e/0x210 [ 429.835451] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.840301] invalid_op+0x14/0x20 [ 429.843765] RIP: 0010:batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 429.851117] Code: ad ff ff e8 dd 8f 6e f9 48 c7 c7 00 e0 6d 89 e8 60 89 59 f9 e9 19 ad ff ff e8 c7 8f 6e f9 48 c7 c7 00 dd 6d 89 e8 4a 89 59 f9 <0f> 0b e9 01 ad ff ff e8 af 8f 6e f9 48 c7 c7 00 dd 6d 89 e8 32 89 [ 429.870002] RSP: 0018:ffff8880b4677cc8 EFLAGS: 00010282 [ 429.875395] RAX: 0000000000000024 RBX: ffff88809af76948 RCX: 0000000000000000 [ 429.882664] RDX: 0000000000000000 RSI: ffffffff814fdbb1 RDI: ffffed10168cef8b [ 429.889930] RBP: ffff88804e8b11c0 R08: 0000000000000024 R09: 0000000000000000 [ 429.897182] R10: 0000000000000005 R11: 0000000000000000 R12: ffff88809eb3d680 [ 429.904437] R13: ffff88809dde6940 R14: ffff88809af76900 R15: ffff88804e8b11c0 [ 429.911833] ? vprintk_func+0x81/0x17e [ 429.915713] ? batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 429.922457] process_one_work+0x864/0x1570 [ 429.926688] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 429.931346] worker_thread+0x64c/0x1130 [ 429.935308] ? process_one_work+0x1570/0x1570 [ 429.939802] kthread+0x33f/0x460 [ 429.943150] ? kthread_park+0x180/0x180 [ 429.947107] ret_from_fork+0x24/0x30 [ 429.951462] Kernel Offset: disabled [ 429.955218] Rebooting in 86400 seconds..