0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e0041001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:16 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001409000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2991.796251][T16382] bridge0: port 3(team0) entered disabled state
04:26:16 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002", 0x29}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2991.844947][T16388] netlink: 'syz-executor.1': attribute type 10 has an invalid length.
04:26:16 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000011008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:16 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140c000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:16 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x700)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:16 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e0004001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:16 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000", 0x2c}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2991.985011][T16394] bridge0: port 3(team0) entered disabled state
04:26:16 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x900)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:16 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000", 0x2c}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2992.178678][T16403] __nla_validate_parse: 42 callbacks suppressed
[ 2992.178698][T16403] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 2992.217081][T16403] bridge0: port 3(team0) entered blocking state
[ 2992.226519][T16403] bridge0: port 3(team0) entered disabled state
[ 2992.237205][T16403] bridge0: port 3(team0) entered blocking state
[ 2992.243753][T16403] bridge0: port 3(team0) entered forwarding state
[ 2992.252188][T16399] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 2992.269314][T16411] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 2992.286318][T16411] bridge0: port 3(team0) entered blocking state
04:26:16 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000012008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:16 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000", 0x2c}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:16 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e0000000e008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2992.327042][T16411] bridge0: port 3(team0) entered disabled state
[ 2992.369155][T16411] bridge0: port 3(team0) entered blocking state
[ 2992.375701][T16411] bridge0: port 3(team0) entered forwarding state
04:26:16 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140e000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:16 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140000000280000012", 0x2d}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:16 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xa00)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2992.424175][T16412] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 2992.459768][T16419] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
04:26:16 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e0041001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:16 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e0000002f008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:16 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140000000280000012", 0x2d}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2992.561800][T16424] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 2992.601051][T16428] bridge0: port 3(team0) entered disabled state
04:26:16 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140c000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:17 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140000000280000012", 0x2d}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:17 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:17 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xc00)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2992.839187][T16432] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 2992.869144][T16432] bridge0: port 3(team0) entered blocking state
[ 2992.879458][T16432] bridge0: port 3(team0) entered disabled state
04:26:17 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140f000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2992.897341][T16432] bridge0: port 3(team0) entered blocking state
[ 2992.903881][T16432] bridge0: port 3(team0) entered forwarding state
[ 2992.911918][T16434] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
04:26:17 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e0000007b008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2992.951179][T16439] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 2992.973427][T16441] bridge0: port 3(team0) entered disabled state
04:26:17 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a021400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 2993.268943][T16445] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 2993.280192][T16445] bridge0: port 3(team0) entered blocking state
[ 2993.288594][T16445] bridge0: port 3(team0) entered disabled state
[ 2993.301131][T16445] bridge0: port 3(team0) entered blocking state
[ 2993.307684][T16445] bridge0: port 3(team0) entered forwarding state
04:26:17 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xd81)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2993.322383][T16452] bridge0: port 3(team0) entered disabled state
04:26:17 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8481000002c5e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:17 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:17 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xe00)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:17 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:17 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a041400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 2993.502385][T16458] bridge0: port 3(team0) entered blocking state
[ 2993.509360][T16458] bridge0: port 3(team0) entered disabled state
[ 2993.522251][T16458] bridge0: port 3(team0) entered blocking state
[ 2993.528776][T16458] bridge0: port 3(team0) entered forwarding state
04:26:17 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xf00)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:17 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010028188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:17 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001410000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:17 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140f000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:18 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a051400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:18 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x2c00)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2993.780324][T16478] bridge0: port 3(team0) entered disabled state
04:26:18 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50)
04:26:18 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010038188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2993.938741][T16483] bridge0: port 3(team0) entered blocking state
[ 2993.952956][T16483] bridge0: port 3(team0) entered disabled state
[ 2993.973971][T16483] bridge0: port 3(team0) entered blocking state
[ 2993.980497][T16483] bridge0: port 3(team0) entered forwarding state
[ 2993.989162][T16487] bridge0: port 3(team0) entered disabled state
04:26:18 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x5865)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:18 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140f000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2994.038572][T16482] bridge0: port 3(team0) entered blocking state
[ 2994.054516][T16482] bridge0: port 3(team0) entered disabled state
[ 2994.092820][T16482] bridge0: port 3(team0) entered blocking state
[ 2994.099664][T16482] bridge0: port 3(team0) entered forwarding state
04:26:18 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00142c000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:18 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a061400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:18 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010048188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:18 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x6000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:18 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50)
[ 2994.219481][T16499] bridge0: port 3(team0) entered disabled state
[ 2994.383527][T16500] bridge0: port 3(team0) entered blocking state
[ 2994.390128][T16500] bridge0: port 3(team0) entered disabled state
[ 2994.403350][T16500] bridge0: port 3(team0) entered blocking state
[ 2994.409878][T16500] bridge0: port 3(team0) entered forwarding state
04:26:18 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50)
04:26:18 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x6558)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:18 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010058188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2994.449243][T16509] bridge0: port 3(team0) entered disabled state
04:26:18 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a071400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:18 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010048188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:19 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010068188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:19 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001460000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:19 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x8100)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:19 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00142c000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:19 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a081400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:19 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8481000000e5e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:19 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a091400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 2994.973881][T16531] bridge0: port 3(team0) entered disabled state
[ 2995.166062][T16541] bridge0: port 3(team0) entered blocking state
[ 2995.172773][T16541] bridge0: port 3(team0) entered disabled state
[ 2995.183644][T16541] bridge0: port 3(team0) entered blocking state
[ 2995.190172][T16541] bridge0: port 3(team0) entered forwarding state
[ 2995.199707][T16540] batman_adv: batadv0: Interface deactivated: team0
04:26:19 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x810d)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:19 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010078188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2995.223784][T16540] batman_adv: batadv0: Removing interface: team0
[ 2995.255598][T16540] bridge0: port 3(team0) entered blocking state
04:26:19 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000085e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2995.273686][T16540] bridge0: port 3(team0) entered disabled state
[ 2995.284866][T16540] team0: entered allmulticast mode
[ 2995.290370][T16540] team_slave_0: entered allmulticast mode
04:26:19 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xf000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2995.316984][T16540] team_slave_1: entered allmulticast mode
[ 2995.362177][T16540] bridge0: port 3(team0) entered blocking state
[ 2995.368685][T16540] bridge0: port 3(team0) entered forwarding state
[ 2995.381277][T16544] bridge0: port 3(team0) entered blocking state
[ 2995.390127][T16544] bridge0: port 3(team0) entered disabled state
[ 2995.403922][T16544] bridge0: port 3(team0) entered blocking state
04:26:19 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0a1400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 2995.410426][T16544] bridge0: port 3(team0) entered forwarding state
04:26:19 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xf0ffff)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:19 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010088188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:19 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014f0000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:19 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:19 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e09000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:19 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0c1400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 2995.626823][T16561] bridge0: port 3(team0) entered disabled state
04:26:19 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x1000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:20 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010098188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2995.820008][T16568] bridge0: port 3(team0) entered blocking state
[ 2995.826857][T16568] bridge0: port 3(team0) entered disabled state
[ 2995.838301][T16568] bridge0: port 3(team0) entered blocking state
[ 2995.844878][T16568] bridge0: port 3(team0) entered forwarding state
04:26:20 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e0000000b008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:20 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400050002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2995.948557][T16567] batman_adv: batadv0: Adding interface: bond0
[ 2996.021555][T16567] batman_adv: batadv0: The MTU of interface bond0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
04:26:20 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x2000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:20 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000100a8188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:20 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0e1400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 2996.098782][T16567] batman_adv: batadv0: Interface activated: bond0
[ 2996.158701][T16582] bridge0: port 3(team0) entered disabled state
04:26:20 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014f0000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:20 executing program 2:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848102c00005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 2996.385959][T16583] validate_nla: 82 callbacks suppressed
[ 2996.385982][T16583] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
[ 2996.412272][T16583] bridge0: port 3(team0) entered blocking state
[ 2996.421177][T16583] bridge0: port 3(team0) entered disabled state
04:26:20 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400060002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2996.432498][T16583] bridge0: port 3(team0) entered blocking state
[ 2996.439027][T16583] bridge0: port 3(team0) entered forwarding state
[ 2996.449085][T16585] netlink: 'syz-executor.0': attribute type 10 has an invalid length.
[ 2996.473186][T16588] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
04:26:20 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000100c8188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2996.495793][T16589] netlink: 'syz-executor.1': attribute type 10 has an invalid length.
[ 2996.519050][T16591] netlink: 'syz-executor.2': attribute type 10 has an invalid length.
[ 2996.533464][T16593] netlink: 'syz-executor.4': attribute type 10 has an invalid length.
04:26:20 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x4000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:20 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0f1400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 2996.552883][T16593] team0: left allmulticast mode
[ 2996.567447][T16593] team_slave_0: left allmulticast mode
[ 2996.617852][T16593] team_slave_1: left allmulticast mode
[ 2996.630849][T16593] bridge0: port 3(team0) entered disabled state
[ 2996.751247][T16594] netlink: 'syz-executor.2': attribute type 10 has an invalid length.
[ 2996.761018][T16597] netlink: 'syz-executor.4': attribute type 10 has an invalid length.
[ 2996.772161][T16597] bridge0: port 3(team0) entered blocking state
[ 2996.783480][T16597] bridge0: port 3(team0) entered disabled state
[ 2996.790211][T16597] team0: entered allmulticast mode
04:26:21 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8481000cf075e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2996.796229][T16597] team_slave_0: entered allmulticast mode
[ 2996.802068][T16597] team_slave_1: entered allmulticast mode
[ 2996.816950][T16597] bridge0: port 3(team0) entered blocking state
[ 2996.823518][T16597] bridge0: port 3(team0) entered forwarding state
[ 2996.834051][T16599] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
[ 2996.850559][T16599] bridge0: port 3(team0) entered disabled state
04:26:21 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:21 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2997.039105][T16601] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
[ 2997.076639][T16601] bridge0: port 3(team0) entered blocking state
04:26:21 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x5000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2997.094703][T16601] bridge0: port 3(team0) entered disabled state
[ 2997.120107][T16601] bridge0: port 3(team0) entered blocking state
[ 2997.126590][T16601] bridge0: port 3(team0) entered forwarding state
04:26:21 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a101400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:21 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000100e8188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:21 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400070002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:21 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe74, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:21 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe6c, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:21 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x6000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2997.331294][T16622] __nla_validate_parse: 43 callbacks suppressed
[ 2997.331331][T16622] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
04:26:21 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000100f8188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2997.407766][T16623] bridge0: port 3(team0) entered disabled state
04:26:21 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a2c1400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 2997.528526][T16625] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 2997.542285][T16628] team0: left allmulticast mode
[ 2997.548354][T16628] team_slave_0: left allmulticast mode
[ 2997.557927][T16628] team_slave_1: left allmulticast mode
[ 2997.578510][T16628] bridge0: port 3(team0) entered disabled state
[ 2997.674573][T16628] batman_adv: batadv0: Adding interface: team0
[ 2997.681440][T16628] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 2997.731600][T16628] batman_adv: batadv0: Interface activated: team0
[ 2997.755347][T16630] bridge0: port 3(team0) entered disabled state
[ 2997.855966][T16630] batman_adv: batadv0: Adding interface: team0
[ 2997.862615][T16630] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 2997.889777][T16630] batman_adv: batadv0: Interface activated: team0
04:26:22 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x7000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2997.928439][T16632] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 2997.948156][T16632] bridge0: port 3(team0) entered blocking state
[ 2997.955113][T16632] bridge0: port 3(team0) entered disabled state
[ 2997.968032][T16632] bridge0: port 3(team0) entered blocking state
04:26:22 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014cf070002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2997.974605][T16632] bridge0: port 3(team0) entered forwarding state
[ 2997.988047][T16634] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 2998.002347][T16634] batman_adv: batadv0: Interface deactivated: team0
[ 2998.017880][T16634] batman_adv: batadv0: Removing interface: team0
[ 2998.027730][T16634] bridge0: port 3(team0) entered blocking state
[ 2998.037587][T16634] bridge0: port 3(team0) entered disabled state
[ 2998.045768][T16634] team0: entered allmulticast mode
[ 2998.051368][T16634] team_slave_0: entered allmulticast mode
[ 2998.062644][T16634] team_slave_1: entered allmulticast mode
[ 2998.074655][T16634] bridge0: port 3(team0) entered blocking state
[ 2998.081168][T16634] bridge0: port 3(team0) entered forwarding state
[ 2998.088639][T16635] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 2998.100422][T16635] batman_adv: batadv0: Interface deactivated: team0
[ 2998.111958][T16635] batman_adv: batadv0: Removing interface: team0
04:26:22 executing program 4:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x6000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2998.124542][T16635] bridge0: port 3(team0) entered blocking state
[ 2998.131083][T16635] bridge0: port 3(team0) entered disabled state
[ 2998.144886][T16635] bridge0: port 3(team0) entered blocking state
[ 2998.151464][T16635] bridge0: port 3(team0) entered forwarding state
[ 2998.164934][T16638] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 2998.201236][T16641] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
04:26:22 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe68, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:22 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010108188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2998.254933][T16646] bridge0: port 3(team0) entered disabled state
04:26:22 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x8000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:22 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a601400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 2998.510180][T16648] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 2998.521686][T16648] bridge0: port 3(team0) entered blocking state
[ 2998.528702][T16648] bridge0: port 3(team0) entered disabled state
[ 2998.539022][T16648] bridge0: port 3(team0) entered blocking state
[ 2998.545621][T16648] bridge0: port 3(team0) entered forwarding state
[ 2998.555058][T16650] team0: left allmulticast mode
04:26:22 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400090002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2998.560042][T16650] team_slave_0: left allmulticast mode
[ 2998.569400][T16650] team_slave_1: left allmulticast mode
[ 2998.580162][T16650] bridge0: port 3(team0) entered disabled state
[ 2998.609458][T16650] batman_adv: batadv0: Adding interface: team0
[ 2998.622569][T16650] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 2998.648461][T16650] batman_adv: batadv0: Interface activated: team0
04:26:22 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100004005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2998.656864][T16652] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 2998.681604][T16657] bridge0: port 3(team0) entered disabled state
04:26:23 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000102c8188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2998.909311][T16657] batman_adv: batadv0: Adding interface: team0
[ 2998.917999][T16657] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 2998.966916][T16657] batman_adv: batadv0: Interface activated: team0
[ 2998.978171][T16659] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 2998.996778][T16661] batman_adv: batadv0: Interface deactivated: team0
04:26:23 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x9000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:23 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000001800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 2999.011646][T16661] batman_adv: batadv0: Removing interface: team0
[ 2999.038471][T16661] bridge0: port 3(team0) entered blocking state
[ 2999.054943][T16661] bridge0: port 3(team0) entered disabled state
[ 2999.069566][T16661] bridge0: port 3(team0) entered blocking state
[ 2999.076113][T16661] bridge0: port 3(team0) entered forwarding state
04:26:23 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe4c, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2999.100412][T16665] bridge0: port 3(team0) entered disabled state
[ 2999.267745][T16666] bridge0: port 3(team0) entered blocking state
[ 2999.274590][T16666] bridge0: port 3(team0) entered disabled state
[ 2999.285465][T16666] bridge0: port 3(team0) entered blocking state
[ 2999.291912][T16666] bridge0: port 3(team0) entered forwarding state
[ 2999.300089][T16671] batman_adv: batadv0: Interface deactivated: team0
[ 2999.306930][T16671] batman_adv: batadv0: Removing interface: team0
04:26:23 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000a0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2999.322547][T16671] bridge0: port 3(team0) entered blocking state
[ 2999.329466][T16671] bridge0: port 3(team0) entered disabled state
[ 2999.339442][T16671] team0: entered allmulticast mode
[ 2999.348690][T16671] team_slave_0: entered allmulticast mode
[ 2999.354961][T16671] team_slave_1: entered allmulticast mode
[ 2999.366253][T16671] bridge0: port 3(team0) entered blocking state
[ 2999.372828][T16671] bridge0: port 3(team0) entered forwarding state
[ 2999.402621][T16674] batman_adv: batadv0: Adding interface: team0
04:26:23 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400090002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:23 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010318188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2999.410610][T16674] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 2999.448904][T16674] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active
04:26:23 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001402000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 2999.478689][T16676] batman_adv: batadv0: Removing interface: team0
[ 2999.510679][T16679] bridge0: port 3(team0) entered disabled state
04:26:23 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xa000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 2999.698480][T16679] batman_adv: batadv0: Adding interface: team0
[ 2999.705069][T16679] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 2999.733744][T16679] batman_adv: batadv0: Interface activated: team0
[ 2999.757430][T16681] batman_adv: batadv0: Interface deactivated: team0
[ 2999.764190][T16681] batman_adv: batadv0: Removing interface: team0
[ 2999.772429][T16681] bridge0: port 3(team0) entered blocking state
[ 2999.779412][T16681] bridge0: port 3(team0) entered disabled state
[ 2999.790844][T16681] bridge0: port 3(team0) entered blocking state
[ 2999.797380][T16681] bridge0: port 3(team0) entered forwarding state
[ 2999.809842][T16683] bridge0: port 3(team0) entered disabled state
04:26:24 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe48, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2999.933987][T16684] bridge0: port 3(team0) entered blocking state
[ 2999.940694][T16684] bridge0: port 3(team0) entered disabled state
[ 2999.953746][T16684] bridge0: port 3(team0) entered blocking state
[ 2999.960287][T16684] bridge0: port 3(team0) entered forwarding state
[ 2999.972367][T16686] team0: left allmulticast mode
04:26:24 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010488188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:24 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000c0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 2999.979138][T16686] team_slave_0: left allmulticast mode
[ 2999.985423][T16686] team_slave_1: left allmulticast mode
[ 2999.999256][T16686] bridge0: port 3(team0) entered disabled state
[ 3000.190163][T16689] bridge0: port 3(team0) entered blocking state
[ 3000.205921][T16689] bridge0: port 3(team0) entered disabled state
[ 3000.212578][T16689] team0: entered allmulticast mode
[ 3000.219133][T16689] team_slave_0: entered allmulticast mode
[ 3000.226563][T16689] team_slave_1: entered allmulticast mode
[ 3000.236281][T16689] bridge0: port 3(team0) entered blocking state
[ 3000.242977][T16689] bridge0: port 3(team0) entered forwarding state
04:26:24 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001404000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:24 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xc000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3000.310903][T16698] bridge0: port 3(team0) entered disabled state
04:26:24 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe48, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3000.518888][T16698] batman_adv: batadv0: Adding interface: team0
[ 3000.531106][T16698] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3000.558336][T16698] batman_adv: batadv0: Interface activated: team0
04:26:24 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000104c8188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3000.593594][T16704] bridge0: port 3(team0) entered disabled state
04:26:25 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe31, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3000.811774][T16712] team0: left allmulticast mode
04:26:25 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000e0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:25 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xe000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:25 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001405000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3000.834428][T16712] team_slave_0: left allmulticast mode
[ 3000.847672][T16712] team_slave_1: left allmulticast mode
[ 3000.935512][T16712] bridge0: port 3(team0) entered disabled state
[ 3001.031999][T16712] batman_adv: batadv0: Adding interface: team0
[ 3001.049296][T16712] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3001.093645][T16712] batman_adv: batadv0: Interface activated: team0
[ 3001.103803][T16715] batman_adv: batadv0: Interface deactivated: team0
[ 3001.110712][T16715] batman_adv: batadv0: Removing interface: team0
[ 3001.121925][T16715] bridge0: port 3(team0) entered blocking state
[ 3001.129083][T16715] bridge0: port 3(team0) entered disabled state
[ 3001.135829][T16715] team0: entered allmulticast mode
[ 3001.141169][T16715] team_slave_0: entered allmulticast mode
[ 3001.147210][T16715] team_slave_1: entered allmulticast mode
[ 3001.157155][T16715] bridge0: port 3(team0) entered blocking state
[ 3001.163699][T16715] bridge0: port 3(team0) entered forwarding state
[ 3001.178076][T16720] batman_adv: batadv0: Interface deactivated: team0
04:26:25 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010608188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3001.198583][T16720] batman_adv: batadv0: Removing interface: team0
[ 3001.220975][T16720] bridge0: port 3(team0) entered blocking state
[ 3001.230898][T16720] bridge0: port 3(team0) entered disabled state
04:26:25 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000c0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3001.249851][T16720] bridge0: port 3(team0) entered blocking state
[ 3001.256376][T16720] bridge0: port 3(team0) entered forwarding state
[ 3001.290103][T16726] bridge0: port 3(team0) entered blocking state
04:26:25 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe0f, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3001.304756][T16726] bridge0: port 3(team0) entered disabled state
[ 3001.339157][T16726] bridge0: port 3(team0) entered blocking state
[ 3001.345733][T16726] bridge0: port 3(team0) entered forwarding state
04:26:25 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xf000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:25 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001406000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:25 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000f0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:25 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010688188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3001.456157][T16734] team0: left allmulticast mode
[ 3001.471052][T16734] team_slave_0: left allmulticast mode
[ 3001.561480][T16734] team_slave_1: left allmulticast mode
[ 3001.572782][T16734] bridge0: port 3(team0) entered disabled state
[ 3001.702451][T16737] validate_nla: 66 callbacks suppressed
[ 3001.702486][T16737] netlink: 'syz-executor.1': attribute type 10 has an invalid length.
[ 3001.723592][T16738] netlink: 'syz-executor.4': attribute type 10 has an invalid length.
[ 3001.732391][T16738] bridge0: port 3(team0) entered blocking state
[ 3001.739253][T16738] bridge0: port 3(team0) entered disabled state
[ 3001.746086][T16738] team0: entered allmulticast mode
04:26:26 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x10000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3001.751352][T16738] team_slave_0: entered allmulticast mode
[ 3001.763684][T16738] team_slave_1: entered allmulticast mode
[ 3001.774475][T16738] bridge0: port 3(team0) entered blocking state
[ 3001.781061][T16738] bridge0: port 3(team0) entered forwarding state
04:26:26 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe0c, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3001.799060][T16740] netlink: 'syz-executor.2': attribute type 10 has an invalid length.
[ 3001.819153][T16740] bridge0: port 3(team0) entered disabled state
[ 3001.939760][T16740] batman_adv: batadv0: Adding interface: team0
[ 3001.948215][T16740] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3001.978519][T16740] batman_adv: batadv0: Interface activated: team0
[ 3001.989304][T16742] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 3001.999799][T16746] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 3002.010943][T16747] netlink: 'syz-executor.2': attribute type 10 has an invalid length.
[ 3002.029372][T16747] batman_adv: batadv0: Interface deactivated: team0
04:26:26 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001407000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3002.043178][T16747] batman_adv: batadv0: Removing interface: team0
[ 3002.052463][T16747] bridge0: port 3(team0) entered blocking state
[ 3002.059256][T16747] bridge0: port 3(team0) entered disabled state
[ 3002.074961][T16747] bridge0: port 3(team0) entered blocking state
[ 3002.081462][T16747] bridge0: port 3(team0) entered forwarding state
04:26:26 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3002.092196][T16744] netlink: 'syz-executor.0': attribute type 10 has an invalid length.
04:26:26 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000106c8188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3002.145176][T16748] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
[ 3002.179506][T16748] bridge0: port 3(team0) entered disabled state
[ 3002.318167][T16750] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
[ 3002.326690][T16750] bridge0: port 3(team0) entered blocking state
[ 3002.333863][T16750] bridge0: port 3(team0) entered disabled state
[ 3002.343771][T16750] bridge0: port 3(team0) entered blocking state
[ 3002.350297][T16750] bridge0: port 3(team0) entered forwarding state
[ 3002.357722][T16752] netlink: 'syz-executor.1': attribute type 10 has an invalid length.
04:26:26 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014002c0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3002.370614][T16755] team0: left allmulticast mode
[ 3002.380186][T16755] team_slave_0: left allmulticast mode
[ 3002.396554][T16755] team_slave_1: left allmulticast mode
04:26:26 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x2c000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3002.420559][T16755] bridge0: port 3(team0) entered disabled state
[ 3002.558187][T16755] batman_adv: batadv0: Adding interface: team0
[ 3002.566476][T16755] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3002.595106][T16755] batman_adv: batadv0: Interface activated: team0
[ 3002.608659][T16756] __nla_validate_parse: 25 callbacks suppressed
[ 3002.608682][T16756] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 3002.627024][T16756] batman_adv: batadv0: Interface deactivated: team0
[ 3002.635545][T16756] batman_adv: batadv0: Removing interface: team0
[ 3002.643886][T16756] bridge0: port 3(team0) entered blocking state
[ 3002.650514][T16756] bridge0: port 3(team0) entered disabled state
[ 3002.658018][T16756] team0: entered allmulticast mode
[ 3002.663720][T16756] team_slave_0: entered allmulticast mode
[ 3002.669642][T16756] team_slave_1: entered allmulticast mode
[ 3002.678917][T16756] bridge0: port 3(team0) entered blocking state
[ 3002.685365][T16756] bridge0: port 3(team0) entered forwarding state
[ 3002.695379][T16759] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
04:26:27 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001408000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3002.709850][T16765] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3002.728522][T16764] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
04:26:27 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe09, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3002.761426][T16767] bridge0: port 3(team0) entered disabled state
04:26:27 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010748188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:27 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe07, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3002.907562][T16770] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 3002.957453][T16770] bridge0: port 3(team0) entered blocking state
[ 3002.995590][T16770] bridge0: port 3(team0) entered disabled state
04:26:27 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x60000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:27 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001465580002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3003.005642][T16770] bridge0: port 3(team0) entered blocking state
[ 3003.012104][T16770] bridge0: port 3(team0) entered forwarding state
[ 3003.045842][T16774] team0: left allmulticast mode
[ 3003.060520][T16774] team_slave_0: left allmulticast mode
[ 3003.080712][T16774] team_slave_1: left allmulticast mode
[ 3003.123653][T16774] bridge0: port 3(team0) entered disabled state
[ 3003.223347][T16774] batman_adv: batadv0: Adding interface: team0
[ 3003.243288][T16774] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3003.269660][T16774] batman_adv: batadv0: Interface activated: team0
[ 3003.282397][T16778] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 3003.291907][T16778] batman_adv: batadv0: Interface deactivated: team0
[ 3003.298641][T16778] batman_adv: batadv0: Removing interface: team0
[ 3003.322219][T16778] bridge0: port 3(team0) entered blocking state
[ 3003.328977][T16778] bridge0: port 3(team0) entered disabled state
[ 3003.337788][T16778] team0: entered allmulticast mode
[ 3003.343033][T16778] team_slave_0: entered allmulticast mode
[ 3003.348782][T16778] team_slave_1: entered allmulticast mode
[ 3003.357698][T16778] bridge0: port 3(team0) entered blocking state
[ 3003.364194][T16778] bridge0: port 3(team0) entered forwarding state
04:26:27 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014002c0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3003.378389][T16775] bridge0: port 3(team0) entered disabled state
[ 3003.507575][T16775] batman_adv: batadv0: Adding interface: team0
[ 3003.514637][T16775] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
04:26:27 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000107a8188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3003.564140][T16775] batman_adv: batadv0: Interface activated: team0
[ 3003.578195][T16780] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 3003.592300][T16781] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3003.602090][T16781] batman_adv: batadv0: Interface deactivated: team0
[ 3003.616658][T16781] batman_adv: batadv0: Removing interface: team0
[ 3003.625299][T16781] bridge0: port 3(team0) entered blocking state
[ 3003.631770][T16781] bridge0: port 3(team0) entered disabled state
[ 3003.650022][T16781] bridge0: port 3(team0) entered blocking state
[ 3003.656556][T16781] bridge0: port 3(team0) entered forwarding state
[ 3003.664648][T16782] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
04:26:28 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001409000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:28 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe06, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3003.718249][T16784] bridge0: port 3(team0) entered disabled state
[ 3003.879835][T16798] bridge0: port 3(team0) entered disabled state
[ 3003.936510][T16798] batman_adv: batadv0: Adding interface: team0
[ 3003.968519][T16798] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3003.996594][T16798] batman_adv: batadv0: Interface activated: team0
[ 3004.007770][T16786] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 3004.017469][T16786] bridge0: port 3(team0) entered blocking state
[ 3004.026218][T16786] bridge0: port 3(team0) entered disabled state
04:26:28 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x65580000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3004.038736][T16786] bridge0: port 3(team0) entered blocking state
[ 3004.045259][T16786] bridge0: port 3(team0) entered forwarding state
[ 3004.059292][T16791] team0: left allmulticast mode
[ 3004.069877][T16791] team_slave_0: left allmulticast mode
[ 3004.081360][T16791] team_slave_1: left allmulticast mode
04:26:28 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400600002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3004.100689][T16791] bridge0: port 3(team0) entered disabled state
[ 3004.216938][T16792] bridge0: port 3(team0) entered blocking state
[ 3004.223563][T16792] bridge0: port 3(team0) entered disabled state
[ 3004.230265][T16792] team0: entered allmulticast mode
[ 3004.237497][T16792] team_slave_0: entered allmulticast mode
[ 3004.244886][T16792] team_slave_1: entered allmulticast mode
[ 3004.257381][T16792] bridge0: port 3(team0) entered blocking state
04:26:28 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140a000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3004.264009][T16792] bridge0: port 3(team0) entered forwarding state
[ 3004.272530][T16800] batman_adv: batadv0: Interface deactivated: team0
04:26:28 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188020f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:28 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000107a8188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3004.307450][T16800] batman_adv: batadv0: Removing interface: team0
[ 3004.325559][T16800] bridge0: port 3(team0) entered blocking state
[ 3004.338530][T16800] bridge0: port 3(team0) entered disabled state
[ 3004.352014][T16800] bridge0: port 3(team0) entered blocking state
[ 3004.358567][T16800] bridge0: port 3(team0) entered forwarding state
[ 3004.388177][T16804] bridge0: port 3(team0) entered disabled state
04:26:28 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001465580002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3004.545170][T16806] bridge0: port 3(team0) entered blocking state
[ 3004.553595][T16806] bridge0: port 3(team0) entered disabled state
04:26:28 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x81000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3004.587105][T16806] bridge0: port 3(team0) entered blocking state
[ 3004.593651][T16806] bridge0: port 3(team0) entered forwarding state
04:26:28 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe05, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:28 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140c000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3004.639102][T16818] bridge0: port 3(team0) entered disabled state
04:26:28 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188030f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:28 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001458650002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:29 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x810d0000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3004.912182][T16821] bridge0: port 3(team0) entered blocking state
[ 3004.922997][T16821] bridge0: port 3(team0) entered disabled state
[ 3004.935209][T16821] bridge0: port 3(team0) entered blocking state
[ 3004.941747][T16821] bridge0: port 3(team0) entered forwarding state
04:26:29 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x88a8ffff)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3004.959148][T16829] bridge0: port 3(team0) entered disabled state
04:26:29 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140e000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:29 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188050f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:29 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x9effffff)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3005.066993][T16836] bridge0: port 3(team0) entered blocking state
[ 3005.103029][T16836] bridge0: port 3(team0) entered disabled state
04:26:29 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe04, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3005.130155][T16836] bridge0: port 3(team0) entered blocking state
[ 3005.136708][T16836] bridge0: port 3(team0) entered forwarding state
[ 3005.169585][T16825] team0: left allmulticast mode
[ 3005.183830][T16825] team_slave_0: left allmulticast mode
[ 3005.203101][T16825] team_slave_1: left allmulticast mode
04:26:29 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400810002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:29 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xf0ffffff)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3005.240364][T16825] bridge0: port 3(team0) entered disabled state
04:26:29 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xfcffffff)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:29 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xffffa888)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3005.541871][T16825] batman_adv: batadv0: Adding interface: team0
[ 3005.549070][T16825] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3005.580304][T16825] batman_adv: batadv0: Interface activated: team0
[ 3005.607399][T16830] batman_adv: batadv0: Interface deactivated: team0
[ 3005.617318][T16830] batman_adv: batadv0: Removing interface: team0
[ 3005.630926][T16830] bridge0: port 3(team0) entered blocking state
[ 3005.646540][T16830] bridge0: port 3(team0) entered disabled state
[ 3005.660007][T16830] team0: entered allmulticast mode
[ 3005.676795][T16830] team_slave_0: entered allmulticast mode
04:26:30 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xfffff000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3005.700337][T16830] team_slave_1: entered allmulticast mode
[ 3005.726178][T16830] bridge0: port 3(team0) entered blocking state
[ 3005.732787][T16830] bridge0: port 3(team0) entered forwarding state
04:26:30 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140f000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3005.753985][T16848] bridge0: port 3(team0) entered disabled state
04:26:30 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188060f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:30 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe05, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3005.876250][T16848] batman_adv: batadv0: Adding interface: team0
[ 3005.891572][T16848] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
04:26:30 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xffffff7f)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3005.970116][T16848] batman_adv: batadv0: Interface activated: team0
[ 3006.009836][T16852] batman_adv: batadv0: Interface deactivated: team0
[ 3006.024240][T16852] batman_adv: batadv0: Removing interface: team0
[ 3006.063793][T16852] bridge0: port 3(team0) entered blocking state
[ 3006.078480][T16852] bridge0: port 3(team0) entered disabled state
04:26:30 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xffffff9e)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3006.120085][T16852] bridge0: port 3(team0) entered blocking state
[ 3006.126689][T16852] bridge0: port 3(team0) entered forwarding state
04:26:30 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xfffffff0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:30 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe03, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3006.167556][T16851] bridge0: port 3(team0) entered disabled state
[ 3006.188692][T16855] bridge0: port 3(team0) entered blocking state
[ 3006.205844][T16855] bridge0: port 3(team0) entered disabled state
04:26:30 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001407cf0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3006.238892][T16855] bridge0: port 3(team0) entered blocking state
[ 3006.245575][T16855] bridge0: port 3(team0) entered forwarding state
[ 3006.260755][T16864] team0: left allmulticast mode
[ 3006.280681][T16864] team_slave_0: left allmulticast mode
04:26:30 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xfffffffc)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3006.303055][T16864] team_slave_1: left allmulticast mode
[ 3006.339707][T16864] bridge0: port 3(team0) entered disabled state
04:26:30 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x7f910727cda9)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3006.502330][T16864] batman_adv: batadv0: Adding interface: team0
[ 3006.532835][T16864] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
04:26:30 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xf0ffffffffffff)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3006.576821][T16864] batman_adv: batadv0: Interface activated: team0
[ 3006.611093][T16868] batman_adv: batadv0: Interface deactivated: team0
[ 3006.627108][T16868] batman_adv: batadv0: Removing interface: team0
[ 3006.641426][T16868] bridge0: port 3(team0) entered blocking state
[ 3006.649384][T16868] bridge0: port 3(team0) entered disabled state
04:26:30 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x100000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3006.682392][T16868] team0: entered allmulticast mode
[ 3006.712791][T16868] team_slave_0: entered allmulticast mode
[ 3006.730802][T16868] team_slave_1: entered allmulticast mode
[ 3006.757107][T16868] bridge0: port 3(team0) entered blocking state
[ 3006.763678][T16868] bridge0: port 3(team0) entered forwarding state
[ 3006.778950][T16869] validate_nla: 56 callbacks suppressed
[ 3006.778972][T16869] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
04:26:31 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe02, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:31 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001410000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3006.809418][T16867] netlink: 'syz-executor.0': attribute type 10 has an invalid length.
[ 3006.843555][T16881] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
04:26:31 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188070f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3006.873188][T16881] bridge0: port 3(team0) entered disabled state
[ 3007.051899][T16879] netlink: 'syz-executor.2': attribute type 10 has an invalid length.
[ 3007.069225][T16879] bridge0: port 3(team0) entered disabled state
[ 3007.150782][T16879] batman_adv: batadv0: Adding interface: team0
[ 3007.161826][T16879] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3007.189647][T16879] batman_adv: batadv0: Interface activated: team0
[ 3007.200809][T16884] netlink: 'syz-executor.2': attribute type 10 has an invalid length.
[ 3007.209919][T16884] batman_adv: batadv0: Interface deactivated: team0
[ 3007.216844][T16884] batman_adv: batadv0: Removing interface: team0
[ 3007.228018][T16884] bridge0: port 3(team0) entered blocking state
[ 3007.235244][T16884] bridge0: port 3(team0) entered disabled state
04:26:31 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe03, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3007.247416][T16884] bridge0: port 3(team0) entered blocking state
[ 3007.253981][T16884] bridge0: port 3(team0) entered forwarding state
[ 3007.262094][T16885] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
[ 3007.274495][T16885] bridge0: port 3(team0) entered blocking state
[ 3007.285437][T16885] bridge0: port 3(team0) entered disabled state
04:26:31 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400f00002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3007.295712][T16885] bridge0: port 3(team0) entered blocking state
[ 3007.302208][T16885] bridge0: port 3(team0) entered forwarding state
[ 3007.315098][T16891] netlink: 'syz-executor.1': attribute type 10 has an invalid length.
[ 3007.346076][T16896] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 3007.362167][T16895] netlink: 'syz-executor.4': attribute type 10 has an invalid length.
[ 3007.387314][T16895] team0: left allmulticast mode
04:26:31 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x200000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3007.409119][T16895] team_slave_0: left allmulticast mode
[ 3007.418227][T16895] team_slave_1: left allmulticast mode
[ 3007.461397][T16895] bridge0: port 3(team0) entered disabled state
[ 3007.520859][T16895] batman_adv: batadv0: Adding interface: team0
[ 3007.544366][T16895] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
04:26:31 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00142c000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3007.575080][T16895] batman_adv: batadv0: Interface activated: team0
[ 3007.586299][T16899] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 3007.613056][T16900] __nla_validate_parse: 23 callbacks suppressed
[ 3007.613082][T16900] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 3007.635008][T16900] batman_adv: batadv0: Interface deactivated: team0
[ 3007.641806][T16900] batman_adv: batadv0: Removing interface: team0
[ 3007.656579][T16900] bridge0: port 3(team0) entered blocking state
[ 3007.665781][T16900] bridge0: port 3(team0) entered disabled state
[ 3007.672340][T16900] team0: entered allmulticast mode
[ 3007.678361][T16900] team_slave_0: entered allmulticast mode
[ 3007.684746][T16900] team_slave_1: entered allmulticast mode
[ 3007.694049][T16900] bridge0: port 3(team0) entered blocking state
[ 3007.700518][T16900] bridge0: port 3(team0) entered forwarding state
[ 3007.708106][T16902] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
04:26:32 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188080f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:32 executing program 4:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001407cf0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3007.729518][T16904] bridge0: port 3(team0) entered disabled state
04:26:32 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188090f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3007.980866][T16904] batman_adv: batadv0: Adding interface: team0
[ 3007.991246][T16904] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3008.017855][T16904] batman_adv: batadv0: Interface activated: team0
[ 3008.036523][T16907] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3008.049707][T16907] batman_adv: batadv0: Interface deactivated: team0
[ 3008.056764][T16907] batman_adv: batadv0: Removing interface: team0
[ 3008.066761][T16907] bridge0: port 3(team0) entered blocking state
[ 3008.078077][T16907] bridge0: port 3(team0) entered disabled state
[ 3008.088543][T16907] bridge0: port 3(team0) entered blocking state
[ 3008.095094][T16907] bridge0: port 3(team0) entered forwarding state
[ 3008.108461][T16906] bridge0: port 3(team0) entered disabled state
04:26:32 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:32 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x400000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3008.208588][T16910] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 3008.227081][T16910] bridge0: port 3(team0) entered blocking state
[ 3008.234998][T16910] bridge0: port 3(team0) entered disabled state
04:26:32 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000003800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3008.254271][T16910] bridge0: port 3(team0) entered blocking state
[ 3008.260850][T16910] bridge0: port 3(team0) entered forwarding state
[ 3008.269988][T16914] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 3008.288135][T16920] team0: left allmulticast mode
[ 3008.294394][T16920] team_slave_0: left allmulticast mode
[ 3008.301718][T16920] team_slave_1: left allmulticast mode
04:26:32 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001460000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3008.340871][T16920] bridge0: port 3(team0) entered disabled state
[ 3008.492158][T16922] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 3008.506652][T16922] bridge0: port 3(team0) entered blocking state
[ 3008.513699][T16922] bridge0: port 3(team0) entered disabled state
[ 3008.520366][T16922] team0: entered allmulticast mode
[ 3008.525785][T16922] team_slave_0: entered allmulticast mode
[ 3008.531697][T16922] team_slave_1: entered allmulticast mode
04:26:32 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000100081880a0f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3008.541886][T16922] bridge0: port 3(team0) entered blocking state
[ 3008.548429][T16922] bridge0: port 3(team0) entered forwarding state
[ 3008.560234][T16924] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 3008.577058][T16926] bridge0: port 3(team0) entered disabled state
04:26:32 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (fail_nth: 1)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3008.707378][T16940] FAULT_INJECTION: forcing a failure.
[ 3008.707378][T16940] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3008.738756][T16940] CPU: 0 PID: 16940 Comm: syz-executor.4 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0
[ 3008.748895][T16940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 3008.752587][T16926] batman_adv: batadv0: Adding interface: team0
[ 3008.758973][T16940] Call Trace:
[ 3008.758987][T16940]
[ 3008.758999][T16940] dump_stack_lvl+0x125/0x1b0
[ 3008.759050][T16940] should_fail_ex+0x496/0x5b0
[ 3008.759090][T16940] _copy_from_user+0x30/0xf0
[ 3008.759137][T16940] copy_msghdr_from_user+0x99/0x160
[ 3008.759177][T16940] ? __copy_msghdr+0x460/0x460
[ 3008.759221][T16940] ? rcu_is_watching+0x12/0xb0
[ 3008.759270][T16940] ___sys_sendmsg+0xff/0x1d0
[ 3008.759306][T16940] ? reacquire_held_locks+0x4c0/0x4c0
[ 3008.759365][T16940] ? do_recvmmsg+0x740/0x740
[ 3008.759402][T16940] ? rcu_is_watching+0x12/0xb0
[ 3008.759461][T16940] ? ksys_write+0x214/0x250
[ 3008.759518][T16940] ? __fget_light+0x173/0x200
[ 3008.759564][T16940] __sys_sendmsg+0x117/0x1e0
[ 3008.759603][T16940] ? __sys_sendmsg_sock+0x30/0x30
[ 3008.759656][T16940] ? rcu_is_watching+0x12/0xb0
[ 3008.759704][T16940] do_syscall_64+0xd3/0x250
[ 3008.759753][T16940] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 3008.759792][T16940] RIP: 0033:0x7f42fa27cda9
04:26:33 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (fail_nth: 2)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3008.759818][T16940] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3008.759851][T16940] RSP: 002b:00007f42fb0960c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 3008.759884][T16940] RAX: ffffffffffffffda RBX: 00007f42fa3abf80 RCX: 00007f42fa27cda9
[ 3008.759907][T16940] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004
[ 3008.759929][T16940] RBP: 00007f42fb096120 R08: 0000000000000000 R09: 0000000000000000
[ 3008.759951][T16940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3008.759972][T16940] R13: 000000000000000b R14: 00007f42fa3abf80 R15: 00007fff3c2bb988
[ 3008.760009][T16940]
[ 3008.950565][T16945] FAULT_INJECTION: forcing a failure.
[ 3008.950565][T16945] name failslab, interval 1, probability 0, space 0, times 0
[ 3008.950606][T16945] CPU: 0 PID: 16945 Comm: syz-executor.4 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0
[ 3008.950644][T16945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 3008.964012][T16926] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3008.966580][T16945] Call Trace:
[ 3008.966594][T16945]
[ 3008.966606][T16945] dump_stack_lvl+0x125/0x1b0
[ 3008.966655][T16945] should_fail_ex+0x496/0x5b0
[ 3008.966696][T16945] should_failslab+0x9/0x20
[ 3008.966743][T16945] kmem_cache_alloc_node+0x6d/0x340
[ 3008.969909][T16926] batman_adv: batadv0: Interface activated: team0
[ 3008.982322][T16945] __alloc_skb+0x287/0x330
[ 3008.982358][T16945] ? __napi_build_skb+0x50/0x50
[ 3008.982399][T16945] ? __netlink_dump_start+0x9c0/0x9c0
[ 3008.982462][T16945] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 3008.982515][T16945] netlink_alloc_large_skb+0x4d/0xf0
[ 3009.009827][T16927] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3009.027707][T16945] netlink_sendmsg+0x688/0xd70
[ 3009.032370][T16927] batman_adv: batadv0: Interface deactivated: team0
[ 3009.033950][T16945] ? netlink_unicast+0x810/0x810
[ 3009.038671][T16927] batman_adv: batadv0: Removing interface: team0
[ 3009.043296][T16945] ? bpf_lsm_socket_sendmsg+0x9/0x10
[ 3009.122512][T16945] ? netlink_unicast+0x810/0x810
[ 3009.127568][T16945] __sock_sendmsg+0xd5/0x180
[ 3009.132195][T16945] ____sys_sendmsg+0x6ac/0x940
[ 3009.136994][T16945] ? copy_msghdr_from_user+0x10b/0x160
[ 3009.142475][T16945] ? kernel_sendmsg+0x50/0x50
[ 3009.147187][T16945] ? rcu_is_watching+0x12/0xb0
[ 3009.151998][T16945] ___sys_sendmsg+0x135/0x1d0
[ 3009.156690][T16945] ? reacquire_held_locks+0x4c0/0x4c0
[ 3009.162119][T16945] ? do_recvmmsg+0x740/0x740
[ 3009.166748][T16945] ? rcu_is_watching+0x12/0xb0
[ 3009.171570][T16945] ? ksys_write+0x214/0x250
[ 3009.176113][T16945] ? __fget_light+0x173/0x200
[ 3009.180825][T16945] __sys_sendmsg+0x117/0x1e0
[ 3009.185440][T16945] ? __sys_sendmsg_sock+0x30/0x30
[ 3009.190496][T16945] ? rcu_is_watching+0x12/0xb0
[ 3009.195287][T16945] do_syscall_64+0xd3/0x250
[ 3009.199817][T16945] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 3009.205727][T16945] RIP: 0033:0x7f42fa27cda9
[ 3009.210236][T16945] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3009.229862][T16945] RSP: 002b:00007f42fb0960c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 3009.238298][T16945] RAX: ffffffffffffffda RBX: 00007f42fa3abf80 RCX: 00007f42fa27cda9
[ 3009.246385][T16945] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004
[ 3009.254368][T16945] RBP: 00007f42fb096120 R08: 0000000000000000 R09: 0000000000000000
[ 3009.262363][T16945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3009.270346][T16945] R13: 000000000000000b R14: 00007f42fa3abf80 R15: 00007fff3c2bb988
[ 3009.278340][T16945]
04:26:33 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (fail_nth: 3)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3009.305396][T16927] bridge0: port 3(team0) entered blocking state
[ 3009.316734][T16927] bridge0: port 3(team0) entered disabled state
[ 3009.332632][T16927] bridge0: port 3(team0) entered blocking state
[ 3009.339178][T16927] bridge0: port 3(team0) entered forwarding state
04:26:33 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (fail_nth: 1)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3009.350498][T16931] bridge0: port 3(team0) entered disabled state
04:26:33 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (fail_nth: 4)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3009.382878][T16931] batman_adv: batadv0: Adding interface: team0
[ 3009.404519][T16931] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3009.432011][T16949] FAULT_INJECTION: forcing a failure.
[ 3009.432011][T16949] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3009.441661][T16931] batman_adv: batadv0: Interface activated: team0
[ 3009.452605][T16949] CPU: 0 PID: 16949 Comm: syz-executor.4 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0
[ 3009.462734][T16949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 3009.463682][T16934] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 3009.472807][T16949] Call Trace:
[ 3009.472821][T16949]
[ 3009.472834][T16949] dump_stack_lvl+0x125/0x1b0
[ 3009.493032][T16949] should_fail_ex+0x496/0x5b0
[ 3009.497767][T16949] _copy_from_iter+0x246/0x10f0
[ 3009.502659][T16949] ? __alloc_skb+0x1c5/0x330
[ 3009.507293][T16949] ? page_copy_sane+0x2c0/0x2c0
[ 3009.512194][T16949] ? __napi_build_skb+0x50/0x50
[ 3009.512905][T16934] batman_adv: batadv0: Interface deactivated: team0
[ 3009.517089][T16949] ? __virt_addr_valid+0x5e/0x580
[ 3009.525956][T16934] batman_adv: batadv0: Removing interface: team0
[ 3009.528708][T16949] ? __phys_addr_symbol+0x30/0x70
[ 3009.540146][T16949] ? __check_object_size+0x323/0x730
[ 3009.545501][T16949] netlink_sendmsg+0x812/0xd70
[ 3009.550312][T16949] ? netlink_unicast+0x810/0x810
[ 3009.555287][T16949] ? bpf_lsm_socket_sendmsg+0x9/0x10
[ 3009.560609][T16949] ? netlink_unicast+0x810/0x810
[ 3009.565586][T16949] __sock_sendmsg+0xd5/0x180
[ 3009.570480][T16949] ____sys_sendmsg+0x6ac/0x940
[ 3009.575284][T16949] ? copy_msghdr_from_user+0x10b/0x160
[ 3009.580785][T16949] ? kernel_sendmsg+0x50/0x50
[ 3009.585520][T16949] ? rcu_is_watching+0x12/0xb0
[ 3009.590329][T16949] ___sys_sendmsg+0x135/0x1d0
[ 3009.595028][T16949] ? reacquire_held_locks+0x4c0/0x4c0
[ 3009.600459][T16949] ? do_recvmmsg+0x740/0x740
[ 3009.605073][T16949] ? rcu_is_watching+0x12/0xb0
[ 3009.609870][T16949] ? ksys_write+0x214/0x250
[ 3009.614415][T16949] ? __fget_light+0x173/0x200
[ 3009.619126][T16949] __sys_sendmsg+0x117/0x1e0
[ 3009.623827][T16949] ? __sys_sendmsg_sock+0x30/0x30
[ 3009.628890][T16949] ? rcu_is_watching+0x12/0xb0
[ 3009.633684][T16949] do_syscall_64+0xd3/0x250
[ 3009.638222][T16949] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 3009.644150][T16949] RIP: 0033:0x7f42fa27cda9
[ 3009.648583][T16949] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3009.668252][T16949] RSP: 002b:00007f42fb0960c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 3009.676687][T16949] RAX: ffffffffffffffda RBX: 00007f42fa3abf80 RCX: 00007f42fa27cda9
[ 3009.684681][T16949] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004
[ 3009.692667][T16949] RBP: 00007f42fb096120 R08: 0000000000000000 R09: 0000000000000000
[ 3009.700660][T16949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3009.708645][T16949] R13: 000000000000000b R14: 00007f42fa3abf80 R15: 00007fff3c2bb988
[ 3009.716644][T16949]
04:26:34 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x500000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3009.743726][T16934] bridge0: port 3(team0) entered blocking state
[ 3009.750600][T16951] FAULT_INJECTION: forcing a failure.
[ 3009.750600][T16951] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3009.758608][T16934] bridge0: port 3(team0) entered disabled state
[ 3009.775340][T16951] CPU: 0 PID: 16951 Comm: syz-executor.2 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0
04:26:34 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000004800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:34 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (fail_nth: 5)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3009.785464][T16951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 3009.791856][T16934] bridge0: port 3(team0) entered blocking state
[ 3009.795537][T16951] Call Trace:
[ 3009.795551][T16951]
[ 3009.795562][T16951] dump_stack_lvl+0x125/0x1b0
[ 3009.795611][T16951] should_fail_ex+0x496/0x5b0
[ 3009.802031][T16934] bridge0: port 3(team0) entered forwarding state
[ 3009.805122][T16951] _copy_from_user+0x30/0xf0
[ 3009.828586][T16951] copy_msghdr_from_user+0x99/0x160
[ 3009.833850][T16951] ? __copy_msghdr+0x460/0x460
[ 3009.838676][T16951] ? debug_object_activate+0x349/0x540
[ 3009.844214][T16951] ? reacquire_held_locks+0x4c0/0x4c0
[ 3009.849713][T16951] ___sys_sendmsg+0xff/0x1d0
[ 3009.854366][T16951] ? do_recvmmsg+0x740/0x740
[ 3009.859018][T16951] ? rcu_is_watching+0x12/0xb0
[ 3009.863873][T16951] ? __fget_light+0x173/0x200
[ 3009.868622][T16951] __sys_sendmsg+0x117/0x1e0
[ 3009.873278][T16951] ? __sys_sendmsg_sock+0x30/0x30
[ 3009.878367][T16951] ? kvm_sched_clock_read+0x11/0x20
[ 3009.883639][T16951] ? sched_clock_cpu+0x6d/0x4c0
[ 3009.888553][T16951] do_syscall_64+0xd3/0x250
[ 3009.893141][T16951] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 3009.899089][T16951] RIP: 0033:0x7fbe7fa7cda9
[ 3009.903551][T16951] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3009.915075][T16959] FAULT_INJECTION: forcing a failure.
[ 3009.915075][T16959] name failslab, interval 1, probability 0, space 0, times 0
[ 3009.923275][T16951] RSP: 002b:00007fbe808570c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 3009.923311][T16951] RAX: ffffffffffffffda RBX: 00007fbe7fbabf80 RCX: 00007fbe7fa7cda9
[ 3009.923335][T16951] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004
[ 3009.923356][T16951] RBP: 00007fbe80857120 R08: 0000000000000000 R09: 0000000000000000
[ 3009.936370][T16936] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 3009.944321][T16951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3009.944346][T16951] R13: 000000000000000b R14: 00007fbe7fbabf80 R15: 00007ffecaccc238
[ 3009.944394][T16951]
[ 3010.006712][T16959] CPU: 1 PID: 16959 Comm: syz-executor.4 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0
[ 3010.016856][T16959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 3010.026939][T16959] Call Trace:
[ 3010.030233][T16959]
[ 3010.033194][T16959] dump_stack_lvl+0x125/0x1b0
[ 3010.037908][T16959] should_fail_ex+0x496/0x5b0
[ 3010.042612][T16959] should_failslab+0x9/0x20
[ 3010.047145][T16959] kmem_cache_alloc+0x69/0x320
[ 3010.051947][T16959] skb_clone+0x171/0x3c0
[ 3010.056213][T16959] netlink_deliver_tap+0xb35/0xd00
[ 3010.061361][T16959] netlink_unicast+0x5fa/0x810
[ 3010.066150][T16959] ? netlink_attachskb+0x880/0x880
[ 3010.071285][T16959] ? __phys_addr_symbol+0x30/0x70
[ 3010.076378][T16959] ? __check_object_size+0x323/0x730
[ 3010.081703][T16959] netlink_sendmsg+0x8b7/0xd70
[ 3010.086502][T16959] ? netlink_unicast+0x810/0x810
[ 3010.091483][T16959] ? bpf_lsm_socket_sendmsg+0x9/0x10
[ 3010.096810][T16959] ? netlink_unicast+0x810/0x810
[ 3010.101782][T16959] __sock_sendmsg+0xd5/0x180
[ 3010.106434][T16959] ____sys_sendmsg+0x6ac/0x940
[ 3010.111233][T16959] ? copy_msghdr_from_user+0x10b/0x160
[ 3010.116715][T16959] ? kernel_sendmsg+0x50/0x50
[ 3010.121438][T16959] ? rcu_is_watching+0x12/0xb0
[ 3010.126237][T16959] ___sys_sendmsg+0x135/0x1d0
[ 3010.130949][T16959] ? reacquire_held_locks+0x4c0/0x4c0
[ 3010.136362][T16959] ? do_recvmmsg+0x740/0x740
[ 3010.140975][T16959] ? rcu_is_watching+0x12/0xb0
[ 3010.145769][T16959] ? ksys_write+0x214/0x250
[ 3010.150348][T16959] ? __fget_light+0x173/0x200
[ 3010.155053][T16959] __sys_sendmsg+0x117/0x1e0
[ 3010.159675][T16959] ? __sys_sendmsg_sock+0x30/0x30
[ 3010.164830][T16959] ? rcu_is_watching+0x12/0xb0
[ 3010.170410][T16959] do_syscall_64+0xd3/0x250
[ 3010.175042][T16959] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 3010.180966][T16959] RIP: 0033:0x7f42fa27cda9
[ 3010.185422][T16959] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3010.205100][T16959] RSP: 002b:00007f42fb0960c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 3010.213553][T16959] RAX: ffffffffffffffda RBX: 00007f42fa3abf80 RCX: 00007f42fa27cda9
[ 3010.221579][T16959] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004
[ 3010.229587][T16959] RBP: 00007f42fb096120 R08: 0000000000000000 R09: 0000000000000000
[ 3010.237598][T16959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
04:26:34 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014f0000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:34 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188100f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3010.245768][T16959] R13: 000000000000000b R14: 00007f42fa3abf80 R15: 00007fff3c2bb988
[ 3010.253783][T16959]
[ 3010.295440][T16962] bridge0: port 3(team0) entered disabled state
04:26:34 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x600000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3010.335999][T16962] batman_adv: batadv0: Adding interface: team0
[ 3010.342224][T16962] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
04:26:34 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (fail_nth: 2)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3010.396099][T16962] batman_adv: batadv0: Interface activated: team0
[ 3010.410483][T16959] team0: left allmulticast mode
[ 3010.420243][T16959] team_slave_0: left allmulticast mode
[ 3010.427277][T16959] team_slave_1: left allmulticast mode
[ 3010.433487][T16959] bridge0: port 3(team0) entered disabled state
[ 3010.445981][T16959] batman_adv: batadv0: Adding interface: team0
[ 3010.452321][T16959] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3010.478823][T16959] batman_adv: batadv0: Interface activated: team0
04:26:34 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (fail_nth: 6)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3010.494200][T16961] batman_adv: batadv0: Interface deactivated: team0
[ 3010.511447][T16961] batman_adv: batadv0: Removing interface: team0
[ 3010.534713][T16961] bridge0: port 3(team0) entered blocking state
[ 3010.557999][T16961] bridge0: port 3(team0) entered disabled state
[ 3010.577408][T16975] FAULT_INJECTION: forcing a failure.
[ 3010.577408][T16975] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3010.591209][T16975] CPU: 0 PID: 16975 Comm: syz-executor.2 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0
[ 3010.596519][T16961] bridge0: port 3(team0) entered blocking state
[ 3010.601314][T16975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 3010.601336][T16975] Call Trace:
[ 3010.601365][T16975]
[ 3010.601377][T16975] dump_stack_lvl+0x125/0x1b0
[ 3010.601429][T16975] should_fail_ex+0x496/0x5b0
[ 3010.608104][T16961] bridge0: port 3(team0) entered forwarding state
[ 3010.617715][T16975] _copy_from_user+0x30/0xf0
[ 3010.644424][T16975] kstrtouint_from_user+0xd7/0x1b0
[ 3010.649619][T16975] ? kstrtouint+0x130/0x130
[ 3010.654279][T16975] ? 0xffffffff81000000
[ 3010.658488][T16975] ? lock_acquire+0x464/0x520
[ 3010.663216][T16975] ? lock_sync+0x190/0x190
[ 3010.667688][T16975] proc_fail_nth_write+0x84/0x260
[ 3010.672775][T16975] ? proc_task_getattr+0x230/0x230
[ 3010.677943][T16975] ? preempt_count_sub+0x160/0x160
[ 3010.683116][T16975] vfs_write+0x2a4/0xdf0
[ 3010.687425][T16975] ? proc_task_getattr+0x230/0x230
[ 3010.692601][T16975] ? kernel_write+0x6c0/0x6c0
[ 3010.697336][T16975] ? mutex_trylock+0x130/0x130
[ 3010.702157][T16975] ? __fget_files+0x256/0x400
04:26:35 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040280ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3010.706902][T16975] ksys_write+0x12f/0x250
[ 3010.711292][T16975] ? __ia32_sys_read+0xb0/0xb0
[ 3010.716126][T16975] ? rcu_is_watching+0x12/0xb0
[ 3010.721134][T16975] do_syscall_64+0xd3/0x250
[ 3010.725710][T16975] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 3010.731672][T16975] RIP: 0033:0x7fbe7fa7baef
[ 3010.735685][T16977] FAULT_INJECTION: forcing a failure.
[ 3010.735685][T16977] name failslab, interval 1, probability 0, space 0, times 0
[ 3010.736110][T16975] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48
[ 3010.736147][T16975] RSP: 002b:00007fbe808360c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
[ 3010.776819][T16975] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbe7fa7baef
[ 3010.784838][T16975] RDX: 0000000000000001 RSI: 00007fbe80836130 RDI: 0000000000000004
[ 3010.792858][T16975] RBP: 00007fbe80836120 R08: 0000000000000000 R09: 0000000000000000
[ 3010.800870][T16975] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
[ 3010.808881][T16975] R13: 000000000000006e R14: 00007fbe7fbac050 R15: 00007ffecaccc238
[ 3010.816981][T16975]
[ 3010.820019][T16977] CPU: 1 PID: 16977 Comm: syz-executor.4 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0
[ 3010.830126][T16977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 3010.840200][T16977] Call Trace:
[ 3010.843498][T16977]
[ 3010.846443][T16977] dump_stack_lvl+0x125/0x1b0
[ 3010.851155][T16977] should_fail_ex+0x496/0x5b0
[ 3010.855867][T16977] should_failslab+0x9/0x20
[ 3010.860409][T16977] kmalloc_trace+0x6b/0x340
[ 3010.864945][T16977] ? security_capable+0x92/0xc0
[ 3010.869868][T16977] ? rtnl_newlink+0x49/0xa0
[ 3010.874410][T16977] rtnl_newlink+0x49/0xa0
[ 3010.878798][T16977] ? __rtnl_newlink+0x1940/0x1940
[ 3010.883858][T16977] rtnetlink_rcv_msg+0x3c7/0xe00
[ 3010.888825][T16977] ? rtnl_fill_vf+0x490/0x490
[ 3010.893547][T16977] netlink_rcv_skb+0x16b/0x440
[ 3010.898361][T16977] ? rtnl_fill_vf+0x490/0x490
[ 3010.903062][T16977] ? netlink_ack+0x1380/0x1380
[ 3010.907874][T16977] ? netlink_deliver_tap+0x1a0/0xd00
[ 3010.913210][T16977] netlink_unicast+0x53b/0x810
[ 3010.918027][T16977] ? netlink_attachskb+0x880/0x880
[ 3010.923174][T16977] ? __phys_addr_symbol+0x30/0x70
[ 3010.928234][T16977] ? __check_object_size+0x323/0x730
[ 3010.933577][T16977] netlink_sendmsg+0x8b7/0xd70
[ 3010.938378][T16977] ? netlink_unicast+0x810/0x810
[ 3010.943352][T16977] ? bpf_lsm_socket_sendmsg+0x9/0x10
[ 3010.948668][T16977] ? netlink_unicast+0x810/0x810
[ 3010.953637][T16977] __sock_sendmsg+0xd5/0x180
[ 3010.958295][T16977] ____sys_sendmsg+0x6ac/0x940
[ 3010.963275][T16977] ? copy_msghdr_from_user+0x10b/0x160
[ 3010.968762][T16977] ? kernel_sendmsg+0x50/0x50
[ 3010.973501][T16977] ? rcu_is_watching+0x12/0xb0
[ 3010.978306][T16977] ___sys_sendmsg+0x135/0x1d0
[ 3010.983015][T16977] ? reacquire_held_locks+0x4c0/0x4c0
[ 3010.988432][T16977] ? do_recvmmsg+0x740/0x740
[ 3010.993052][T16977] ? rcu_is_watching+0x12/0xb0
[ 3010.997889][T16977] ? ksys_write+0x214/0x250
[ 3011.002457][T16977] ? __fget_light+0x173/0x200
[ 3011.007169][T16977] __sys_sendmsg+0x117/0x1e0
[ 3011.011966][T16977] ? __sys_sendmsg_sock+0x30/0x30
[ 3011.017086][T16977] ? rcu_is_watching+0x12/0xb0
[ 3011.021918][T16977] do_syscall_64+0xd3/0x250
[ 3011.026467][T16977] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 3011.032408][T16977] RIP: 0033:0x7f42fa27cda9
[ 3011.036844][T16977] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3011.056472][T16977] RSP: 002b:00007f42fb0960c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 3011.064910][T16977] RAX: ffffffffffffffda RBX: 00007f42fa3abf80 RCX: 00007f42fa27cda9
[ 3011.072921][T16977] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004
[ 3011.080928][T16977] RBP: 00007f42fb096120 R08: 0000000000000000 R09: 0000000000000000
[ 3011.088920][T16977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3011.097173][T16977] R13: 000000000000000b R14: 00007f42fa3abf80 R15: 00007fff3c2bb988
[ 3011.105174][T16977]
04:26:35 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400020002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:35 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x700000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:35 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040380ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:35 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (fail_nth: 7)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:35 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400050002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3011.417742][T16982] bridge0: port 3(team0) entered disabled state
04:26:35 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:35 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x800000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3011.675951][T16986] bridge0: port 3(team0) entered blocking state
[ 3011.682565][T16986] bridge0: port 3(team0) entered disabled state
[ 3011.693553][T16986] bridge0: port 3(team0) entered blocking state
[ 3011.700065][T16986] bridge0: port 3(team0) entered forwarding state
04:26:36 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400040002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:36 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040480ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3011.735960][T16991] FAULT_INJECTION: forcing a failure.
[ 3011.735960][T16991] name fail_usercopy, interval 1, probability 0, space 0, times 0
04:26:36 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:36 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400060002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3011.782333][T16991] CPU: 1 PID: 16991 Comm: syz-executor.4 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0
[ 3011.792485][T16991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 3011.802588][T16991] Call Trace:
[ 3011.805909][T16991]
[ 3011.808878][T16991] dump_stack_lvl+0x125/0x1b0
[ 3011.813623][T16991] should_fail_ex+0x496/0x5b0
[ 3011.818370][T16991] _copy_to_user+0x30/0xb0
[ 3011.822853][T16991] simple_read_from_buffer+0xd0/0x160
[ 3011.828298][T16991] proc_fail_nth_read+0x1b0/0x280
[ 3011.833385][T16991] ? proc_fault_inject_read+0x280/0x280
[ 3011.839006][T16991] ? proc_fault_inject_read+0x280/0x280
[ 3011.844617][T16991] vfs_read+0x1ce/0x8f0
[ 3011.848849][T16991] ? preempt_count_sub+0x160/0x160
[ 3011.854017][T16991] ? kernel_read+0x70/0x70
[ 3011.858494][T16991] ? mutex_trylock+0x130/0x130
[ 3011.863323][T16991] ? __fget_files+0x256/0x400
[ 3011.868076][T16991] ksys_read+0x12f/0x250
[ 3011.872384][T16991] ? vfs_write+0xdf0/0xdf0
[ 3011.876864][T16991] ? rcu_is_watching+0x12/0xb0
[ 3011.881714][T16991] do_syscall_64+0xd3/0x250
[ 3011.886291][T16991] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 3011.890981][T17005] validate_nla: 46 callbacks suppressed
[ 3011.891016][T17005] netlink: 'syz-executor.1': attribute type 10 has an invalid length.
[ 3011.892218][T16991] RIP: 0033:0x7f42fa27ba4c
[ 3011.892247][T16991] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48
[ 3011.892281][T16991] RSP: 002b:00007f42fb0960c0 EFLAGS: 00000246
04:26:36 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x900000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:36 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3011.920120][T17006] netlink: 'syz-executor.0': attribute type 10 has an invalid length.
[ 3011.929999][T16991] ORIG_RAX: 0000000000000000
[ 3011.930015][T16991] RAX: ffffffffffffffda RBX: 00007f42fa3abf80 RCX: 00007f42fa27ba4c
[ 3011.930038][T16991] RDX: 000000000000000f RSI: 00007f42fb096130 RDI: 0000000000000005
[ 3011.930058][T16991] RBP: 00007f42fb096120 R08: 0000000000000000 R09: 0000000000000000
[ 3011.930078][T16991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3011.930100][T16991] R13: 000000000000000b R14: 00007f42fa3abf80 R15: 00007fff3c2bb988
[ 3011.930137][T16991]
[ 3012.111770][T17010] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 3012.126288][T17008] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
[ 3012.147755][T17008] bridge0: port 3(team0) entered disabled state
04:26:36 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040580ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3012.202113][T17013] netlink: 'syz-executor.0': attribute type 10 has an invalid length.
[ 3012.211340][T17009] netlink: 'syz-executor.2': attribute type 10 has an invalid length.
[ 3012.227202][T17011] netlink: 'syz-executor.2': attribute type 10 has an invalid length.
[ 3012.236044][T17012] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
04:26:36 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3012.247519][T17014] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
[ 3012.267893][T17014] bridge0: port 3(team0) entered blocking state
04:26:36 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400070002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3012.297303][T17014] bridge0: port 3(team0) entered disabled state
[ 3012.321690][T17014] bridge0: port 3(team0) entered blocking state
[ 3012.328290][T17014] bridge0: port 3(team0) entered forwarding state
[ 3012.341731][T17017] netlink: 'syz-executor.4': attribute type 10 has an invalid length.
04:26:36 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xa00000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:36 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:36 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400050002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:36 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040680ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:36 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400090002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3012.529886][T17032] bridge0: port 3(team0) entered disabled state
04:26:36 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3012.593265][T22295] Bluetooth: hci4: command 0x0406 tx timeout
04:26:36 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:37 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xc00000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3012.658571][T17042] __nla_validate_parse: 18 callbacks suppressed
[ 3012.658615][T17042] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 3012.679317][T17036] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 3012.701264][T17036] bridge0: port 3(team0) entered blocking state
04:26:37 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000a0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3012.733132][T17036] bridge0: port 3(team0) entered disabled state
[ 3012.756053][T17036] bridge0: port 3(team0) entered blocking state
[ 3012.762579][T17036] bridge0: port 3(team0) entered forwarding state
04:26:37 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040780ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3012.822044][T17044] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3012.838949][T17045] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
04:26:37 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:37 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xe00000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:37 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:37 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400060002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3012.935521][T17051] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
04:26:37 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000c0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:37 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040880ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3013.046275][T17053] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
04:26:37 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xf00000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:37 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3013.118527][T17060] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3013.148747][T17058] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
04:26:37 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3013.181977][T17063] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
04:26:37 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000e0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:37 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400070002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:37 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x1000000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3013.302116][T17066] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
04:26:37 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040980ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:37 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:37 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:37 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x2c00000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:37 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000f0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3013.486270][T17077] bridge0: port 3(team0) entered disabled state
04:26:38 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400080002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:38 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3013.691305][T17083] bridge0: port 3(team0) entered blocking state
[ 3013.699202][T17083] bridge0: port 3(team0) entered disabled state
[ 3013.710465][T17083] bridge0: port 3(team0) entered blocking state
[ 3013.717032][T17083] bridge0: port 3(team0) entered forwarding state
04:26:38 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014912a0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:38 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:38 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040a80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3013.800589][T17097] bridge0: port 3(team0) entered disabled state
04:26:38 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x6000000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3013.978052][T17099] bridge0: port 3(team0) entered blocking state
[ 3014.008625][T17099] bridge0: port 3(team0) entered disabled state
[ 3014.019452][T17099] bridge0: port 3(team0) entered blocking state
[ 3014.026007][T17099] bridge0: port 3(team0) entered forwarding state
04:26:38 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400090002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:38 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014002c0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:38 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x6558000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:38 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:38 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:38 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040b80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3014.201906][T17112] bridge0: port 3(team0) entered disabled state
04:26:38 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:38 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040c80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3014.325562][T17116] bridge0: port 3(team0) entered blocking state
[ 3014.332159][T17116] bridge0: port 3(team0) entered disabled state
[ 3014.341993][T17116] bridge0: port 3(team0) entered blocking state
[ 3014.348585][T17116] bridge0: port 3(team0) entered forwarding state
04:26:38 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001465580002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:38 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:38 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x8100000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:38 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000a0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:38 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:38 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400600002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:38 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:38 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x810d000000000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:38 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040d80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3014.636852][T17140] bridge0: port 3(team0) entered disabled state
04:26:39 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3014.871659][T17143] bridge0: port 3(team0) entered blocking state
[ 3014.879580][T17143] bridge0: port 3(team0) entered disabled state
[ 3014.889757][T17143] bridge0: port 3(team0) entered blocking state
[ 3014.896187][T17143] bridge0: port 3(team0) entered forwarding state
04:26:39 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:39 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x88a8ffff00000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:39 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040e80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:39 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001458650002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:39 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000c0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:39 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400810002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:39 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3015.151589][T17165] bridge0: port 3(team0) entered disabled state
04:26:39 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188041080ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3015.321162][T17171] bridge0: port 3(team0) entered blocking state
[ 3015.329071][T17171] bridge0: port 3(team0) entered disabled state
[ 3015.339258][T17171] bridge0: port 3(team0) entered blocking state
[ 3015.345805][T17171] bridge0: port 3(team0) entered forwarding state
04:26:39 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:39 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000e0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:39 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00142a910002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:39 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xe, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:39 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x9effffff00000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:39 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188041180ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:39 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3015.549670][T17184] bridge0: port 3(team0) entered disabled state
04:26:40 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xa9cd2707917f0000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:40 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3015.800243][T17192] bridge0: port 3(team0) entered blocking state
[ 3015.810190][T17192] bridge0: port 3(team0) entered disabled state
[ 3015.824961][T17192] bridge0: port 3(team0) entered blocking state
[ 3015.831539][T17192] bridge0: port 3(team0) entered forwarding state
04:26:40 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x2c, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:40 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400f00002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:40 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000f0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:40 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188041280ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:40 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xf0ffffff00000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:40 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000003800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:40 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:40 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3016.076523][T17213] bridge0: port 3(team0) entered disabled state
[ 3016.229511][T17219] batman_adv: batadv0: Adding interface: team0
[ 3016.250732][T17219] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
04:26:40 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x2c, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:40 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xfcffffff00000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:40 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f63ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3016.276677][T17219] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active
[ 3016.298537][T17220] bridge0: port 3(team0) entered blocking state
[ 3016.318350][T17220] bridge0: port 3(team0) entered disabled state
[ 3016.330218][T17220] bridge0: port 3(team0) entered blocking state
[ 3016.336769][T17220] bridge0: port 3(team0) entered forwarding state
[ 3016.351931][T17225] batman_adv: batadv0: Removing interface: team0
04:26:40 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xf0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:40 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:40 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000004800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:40 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xffffff7f00000000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:40 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400100002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:40 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0213a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3016.570034][T17236] batman_adv: batadv0: Adding interface: team0
[ 3016.587932][T17236] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3016.616078][T17236] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active
[ 3016.626487][T17248] batman_adv: batadv0: Removing interface: team0
04:26:40 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x4c, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:41 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400020002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3016.677014][T17245] bridge0: port 3(team0) entered disabled state
04:26:41 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0313a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:41 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0xfffffffffffff000)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3016.795394][T17251] bridge0: port 3(team0) entered blocking state
[ 3016.824468][T17251] bridge0: port 3(team0) entered disabled state
[ 3016.839913][T17251] bridge0: port 3(team0) entered blocking state
[ 3016.846458][T17251] bridge0: port 3(team0) entered forwarding state
04:26:41 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:41 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400040002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:41 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:41 executing program 1:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00\x00\x00\x13\x00')
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x72)
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, r0, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f00000001c0)=r4}, 0x20)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r2, 0x20, &(0x7f0000000540)={&(0x7f0000000440)=""/230, 0xe6, 0x0, &(0x7f0000001380)=""/4096, 0x1000}}, 0x10)
r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x1, '\x00', 0x0, r2, 0x1, 0x4, 0x1}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000640)={r2, 0xffffffffffffffff}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @ldst={0x1, 0x1, 0x4, 0xa, 0x2, 0xe2b25d141704ea4f, 0xfffffffffffffff0}]}, &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x2c, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r2, 0x5, &(0x7f0000000680)=[r7, r8, r3, r1, r2, r2, r3, r2, 0x1], &(0x7f00000006c0)=[{0x4, 0x1, 0x7, 0x9}, {0x4, 0x3, 0xf, 0x8}, {0x1, 0x5, 0x4, 0x3}, {0x3, 0x5, 0x2, 0xb}, {0x0, 0x2, 0x5, 0xa}], 0x10, 0x2}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r9 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:41 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014002c0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3016.961056][T17260] validate_nla: 145 callbacks suppressed
[ 3016.961112][T17260] netlink: 'syz-executor.0': attribute type 10 has an invalid length.
[ 3017.043309][T17265] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 3017.054057][T17265] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
04:26:41 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400050002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3017.083565][T17264] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
[ 3017.107644][T17264] bridge0: port 3(team0) entered disabled state
04:26:41 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0513a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3017.282158][T17268] netlink: 'syz-executor.0': attribute type 10 has an invalid length.
[ 3017.290765][T17270] netlink: 'syz-executor.4': attribute type 10 has an invalid length.
[ 3017.300263][T17272] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
[ 3017.310444][T17272] bridge0: port 3(team0) entered blocking state
[ 3017.319228][T17272] bridge0: port 3(team0) entered disabled state
04:26:41 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x68, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3017.333388][T17272] bridge0: port 3(team0) entered blocking state
[ 3017.339932][T17272] bridge0: port 3(team0) entered forwarding state
[ 3017.362349][T17269] netlink: 'syz-executor.1': attribute type 10 has an invalid length.
04:26:41 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400600002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3017.401002][T17271] netlink: 'syz-executor.2': attribute type 10 has an invalid length.
[ 3017.416043][T17276] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
04:26:41 executing program 1:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00\x00\x00\x13\x00') (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00\x00\x00\x13\x00')
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x72)
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, r0, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0) (async)
r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f00000000c0), &(0x7f00000001c0)=r4}, 0x20) (async)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f00000001c0)=r4}, 0x20)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r2, 0x20, &(0x7f0000000540)={&(0x7f0000000440)=""/230, 0xe6, 0x0, &(0x7f0000001380)=""/4096, 0x1000}}, 0x10)
r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x1, '\x00', 0x0, r2, 0x1, 0x4, 0x1}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000640)={r2, 0xffffffffffffffff}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @ldst={0x1, 0x1, 0x4, 0xa, 0x2, 0xe2b25d141704ea4f, 0xfffffffffffffff0}]}, &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x2c, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r2, 0x5, &(0x7f0000000680)=[r7, r8, r3, r1, r2, r2, r3, r2, 0x1], &(0x7f00000006c0)=[{0x4, 0x1, 0x7, 0x9}, {0x4, 0x3, 0xf, 0x8}, {0x1, 0x5, 0x4, 0x3}, {0x3, 0x5, 0x2, 0xb}, {0x0, 0x2, 0x5, 0xa}], 0x10, 0x2}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @ldst={0x1, 0x1, 0x4, 0xa, 0x2, 0xe2b25d141704ea4f, 0xfffffffffffffff0}]}, &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x2c, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r2, 0x5, &(0x7f0000000680)=[r7, r8, r3, r1, r2, r2, r3, r2, 0x1], &(0x7f00000006c0)=[{0x4, 0x1, 0x7, 0x9}, {0x4, 0x3, 0xf, 0x8}, {0x1, 0x5, 0x4, 0x3}, {0x3, 0x5, 0x2, 0xb}, {0x0, 0x2, 0x5, 0xa}], 0x10, 0x2}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r9 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (async)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:41 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x600, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:41 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400060002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:41 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x6c, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:41 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0613a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:41 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400070002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3017.618302][T17285] bridge0: port 3(team0) entered disabled state
04:26:42 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x74, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3017.794015][T17304] __nla_validate_parse: 51 callbacks suppressed
[ 3017.794038][T17304] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 3017.813010][T17295] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3017.830037][T17296] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
04:26:42 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x700, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:42 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0713a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3017.847400][T17296] bridge0: port 3(team0) entered blocking state
[ 3017.855399][T17296] bridge0: port 3(team0) entered disabled state
[ 3017.867415][T17296] bridge0: port 3(team0) entered blocking state
[ 3017.873984][T17296] bridge0: port 3(team0) entered forwarding state
[ 3017.884741][T17302] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
04:26:42 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400080002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:42 executing program 1:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00\x00\x00\x13\x00') (async)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x72)
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, r0, 0x0) (async)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32)
r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async, rerun: 32)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 32)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (rerun: 32)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async, rerun: 64)
r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 64)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f00000001c0)=r4}, 0x20) (async)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r2, 0x20, &(0x7f0000000540)={&(0x7f0000000440)=""/230, 0xe6, 0x0, &(0x7f0000001380)=""/4096, 0x1000}}, 0x10) (async)
r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x1, '\x00', 0x0, r2, 0x1, 0x4, 0x1}, 0x48) (async)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000640)={r2, 0xffffffffffffffff}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @ldst={0x1, 0x1, 0x4, 0xa, 0x2, 0xe2b25d141704ea4f, 0xfffffffffffffff0}]}, &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x2c, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r2, 0x5, &(0x7f0000000680)=[r7, r8, r3, r1, r2, r2, r3, r2, 0x1], &(0x7f00000006c0)=[{0x4, 0x1, 0x7, 0x9}, {0x4, 0x3, 0xf, 0x8}, {0x1, 0x5, 0x4, 0x3}, {0x3, 0x5, 0x2, 0xb}, {0x0, 0x2, 0x5, 0xa}], 0x10, 0x2}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async)
r9 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (async)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async, rerun: 64)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (rerun: 64)
04:26:42 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400f00002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:42 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x7b3, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3017.952099][T17309] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
04:26:42 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x7a, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3018.072082][T17311] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 3018.140405][T17316] bridge0: port 3(team0) entered disabled state
04:26:42 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xf0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:42 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0813a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3018.458363][T17324] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
[ 3018.501447][T17325] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
04:26:42 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x900, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3018.542016][T17327] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
04:26:42 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400090002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3018.596117][T17327] bridge0: port 3(team0) entered blocking state
[ 3018.629703][T17327] bridge0: port 3(team0) entered disabled state
[ 3018.682673][T17327] bridge0: port 3(team0) entered blocking state
[ 3018.689273][T17327] bridge0: port 3(team0) entered forwarding state
[ 3018.756881][T17334] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
04:26:43 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xa00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:43 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:43 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000502800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:43 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0913a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:43 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000a0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:43 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xc00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:43 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3019.342121][T17349] bridge0: port 3(team0) entered disabled state
04:26:43 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000c0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:43 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0a13a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3019.625870][T17350] bridge0: port 3(team0) entered blocking state
[ 3019.682502][T17350] bridge0: port 3(team0) entered disabled state
[ 3019.758048][T17350] bridge0: port 3(team0) entered blocking state
[ 3019.764616][T17350] bridge0: port 3(team0) entered forwarding state
04:26:44 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x600, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:44 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:44 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000e0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:44 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc1013a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:44 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014000f0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:44 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x20000, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:44 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000602800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:44 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:44 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400100002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:44 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x700, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:44 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f843100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:44 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x20000, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (rerun: 32)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
bpf$ITER_CREATE(0x21, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async, rerun: 32)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async, rerun: 32)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async, rerun: 64)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async, rerun: 64)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (async)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:44 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x2c00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:44 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x900, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:44 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000702800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:44 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a0014002c0002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:44 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xa00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:44 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848020000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3020.512604][T17394] bridge0: port 3(team0) entered disabled state
04:26:44 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x20000, 0xffffffffffffffff, 0x0) (async, rerun: 32)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
bpf$ITER_CREATE(0x21, 0x0, 0x0) (async, rerun: 32)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (rerun: 32)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (async, rerun: 32)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async, rerun: 32)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3020.718921][T17397] bridge0: port 3(team0) entered blocking state
[ 3020.731022][T17397] bridge0: port 3(team0) entered disabled state
[ 3020.745637][T17397] bridge0: port 3(team0) entered blocking state
[ 3020.752150][T17397] bridge0: port 3(team0) entered forwarding state
04:26:45 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400600002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:45 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xc00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:45 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x5865, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:45 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400cf0702800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:45 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848030000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:45 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000580), 0x12)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYRESDEC=r5, @ANYRESHEX, @ANYRES32, @ANYRESHEX, @ANYRES32=r5, @ANYRES8=0x0, @ANYRES64, @ANYRES8], 0xffe6)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001dc0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYRESHEX=r5, @ANYBLOB="d1c0b4fc82e45d1264b9efb4450ab8fccc9365357af34e5ad0d73ba8162c21af68307b2a01efcdee48545fb6d1cab954066963337b115203865fbc23432819c9b852e8085f8a5708a21e0d23ae2ba102bcf7b8689c04fbab8059840142e4ca16c18318be6d39ed64b364686fdeb07560a75b78", @ANYRES32=r1, @ANYRES16=r6], &(0x7f0000000580)='GPL\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, r8, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90)
r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x11, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x7fff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='GPL\x00', 0xdba, 0xb1, &(0x7f00000005c0)=""/177, 0x41000, 0x18, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x5, 0xfffffff4, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1e, 0x17, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x1}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8e46}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0x2, '\x00', r4, 0x8, r2, 0x8, &(0x7f0000000440)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x5, 0x7, 0x7}, 0x10, r8, r9, 0x4, &(0x7f00000007c0)=[r0, r0, r0, r2, r3], &(0x7f0000000800)=[{0x2, 0x2, 0x0, 0xa}, {0x4, 0x3, 0x10}, {0x0, 0x2, 0x2, 0x9}, {0x0, 0x1, 0xa, 0x2}], 0x10, 0x838b}, 0x90)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x8, 0x0, r0, 0x4, '\x00', r4, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r10 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:45 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400f00002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:45 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:45 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x6000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3021.062217][T17424] bridge0: port 3(team0) entered disabled state
04:26:45 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000080)}, 0x10) (async)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000580), 0x12) (async)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000580), 0x12)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYRESDEC=r5, @ANYRESHEX, @ANYRES32, @ANYRESHEX, @ANYRES32=r5, @ANYRES8=0x0, @ANYRES64, @ANYRES8], 0xffe6)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) (async)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001dc0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYRESHEX=r5, @ANYBLOB="d1c0b4fc82e45d1264b9efb4450ab8fccc9365357af34e5ad0d73ba8162c21af68307b2a01efcdee48545fb6d1cab954066963337b115203865fbc23432819c9b852e8085f8a5708a21e0d23ae2ba102bcf7b8689c04fbab8059840142e4ca16c18318be6d39ed64b364686fdeb07560a75b78", @ANYRES32=r1, @ANYRES16=r6], &(0x7f0000000580)='GPL\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, r8, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x11, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x7fff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='GPL\x00', 0xdba, 0xb1, &(0x7f00000005c0)=""/177, 0x41000, 0x18, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x5, 0xfffffff4, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x90) (async)
r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x11, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x7fff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='GPL\x00', 0xdba, 0xb1, &(0x7f00000005c0)=""/177, 0x41000, 0x18, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x5, 0xfffffff4, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1e, 0x17, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x1}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8e46}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0x2, '\x00', r4, 0x8, r2, 0x8, &(0x7f0000000440)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x5, 0x7, 0x7}, 0x10, r8, r9, 0x4, &(0x7f00000007c0)=[r0, r0, r0, r2, r3], &(0x7f0000000800)=[{0x2, 0x2, 0x0, 0xa}, {0x4, 0x3, 0x10}, {0x0, 0x2, 0x2, 0x9}, {0x0, 0x1, 0xa, 0x2}], 0x10, 0x838b}, 0x90)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x8, 0x0, r0, 0x4, '\x00', r4, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) (async)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x8, 0x0, r0, 0x4, '\x00', r4, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r10 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (async)
sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:45 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848040000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3021.209618][T17426] bridge0: port 3(team0) entered blocking state
[ 3021.218976][T17426] bridge0: port 3(team0) entered disabled state
[ 3021.229560][T17426] bridge0: port 3(team0) entered blocking state
[ 3021.236103][T17426] bridge0: port 3(team0) entered forwarding state
04:26:45 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000502800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:45 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000080)}, 0x10) (async)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000580), 0x12)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYRESDEC=r5, @ANYRESHEX, @ANYRES32, @ANYRESHEX, @ANYRES32=r5, @ANYRES8=0x0, @ANYRES64, @ANYRES8], 0xffe6)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001dc0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYRESHEX=r5, @ANYBLOB="d1c0b4fc82e45d1264b9efb4450ab8fccc9365357af34e5ad0d73ba8162c21af68307b2a01efcdee48545fb6d1cab954066963337b115203865fbc23432819c9b852e8085f8a5708a21e0d23ae2ba102bcf7b8689c04fbab8059840142e4ca16c18318be6d39ed64b364686fdeb07560a75b78", @ANYRES32=r1, @ANYRES16=r6], &(0x7f0000000580)='GPL\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, r8, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYRESHEX=r5, @ANYBLOB="d1c0b4fc82e45d1264b9efb4450ab8fccc9365357af34e5ad0d73ba8162c21af68307b2a01efcdee48545fb6d1cab954066963337b115203865fbc23432819c9b852e8085f8a5708a21e0d23ae2ba102bcf7b8689c04fbab8059840142e4ca16c18318be6d39ed64b364686fdeb07560a75b78", @ANYRES32=r1, @ANYRES16=r6], &(0x7f0000000580)='GPL\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, r8, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x11, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x7fff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='GPL\x00', 0xdba, 0xb1, &(0x7f00000005c0)=""/177, 0x41000, 0x18, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x5, 0xfffffff4, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x90) (async)
r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x11, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x7fff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='GPL\x00', 0xdba, 0xb1, &(0x7f00000005c0)=""/177, 0x41000, 0x18, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x5, 0xfffffff4, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1e, 0x17, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x1}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8e46}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0x2, '\x00', r4, 0x8, r2, 0x8, &(0x7f0000000440)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x5, 0x7, 0x7}, 0x10, r8, r9, 0x4, &(0x7f00000007c0)=[r0, r0, r0, r2, r3], &(0x7f0000000800)=[{0x2, 0x2, 0x0, 0xa}, {0x4, 0x3, 0x10}, {0x0, 0x2, 0x2, 0x9}, {0x0, 0x1, 0xa, 0x2}], 0x10, 0x838b}, 0x90)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x8, 0x0, r0, 0x4, '\x00', r4, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) (async)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x8, 0x0, r0, 0x4, '\x00', r4, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r10 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (async)
sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (async)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:45 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:45 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x6558, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:45 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000902800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3021.408917][T17441] batman_adv: batadv0: Adding interface: gretap0
[ 3021.448923][T17441] batman_adv: batadv0: The MTU of interface gretap0 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3021.496525][T17441] batman_adv: batadv0: Interface activated: gretap0
[ 3021.516208][T17445] bridge0: port 3(team0) entered disabled state
04:26:45 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848050000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:45 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:45 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x14b5, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:45 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3021.573696][T17455] bridge0: port 3(team0) entered blocking state
[ 3021.580343][T17455] bridge0: port 3(team0) entered disabled state
[ 3021.600203][T17455] bridge0: port 3(team0) entered blocking state
[ 3021.606824][T17455] bridge0: port 3(team0) entered forwarding state
04:26:45 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000602800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:46 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000a02800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3021.755399][T17461] batman_adv: batadv0: Adding interface: erspan0
[ 3021.779054][T17461] batman_adv: batadv0: The MTU of interface erspan0 is too small (1450) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3021.810143][T17461] batman_adv: batadv0: Interface activated: erspan0
[ 3021.826692][T17470] bridge0: port 3(team0) entered disabled state
04:26:46 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848060000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:46 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x1f00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:46 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000702800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3021.976591][T17474] validate_nla: 114 callbacks suppressed
[ 3021.976614][T17474] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
[ 3021.995315][T17471] netlink: 'syz-executor.1': attribute type 10 has an invalid length.
04:26:46 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (async)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3022.017481][T17466] netlink: 'syz-executor.2': attribute type 10 has an invalid length.
[ 3022.042152][T17476] netlink: 'syz-executor.5': attribute type 10 has an invalid length.
[ 3022.051165][T17476] bridge0: port 3(team0) entered blocking state
04:26:46 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xb307, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3022.084748][T17476] bridge0: port 3(team0) entered disabled state
[ 3022.100529][T17476] bridge0: port 3(team0) entered blocking state
[ 3022.107118][T17476] bridge0: port 3(team0) entered forwarding state
[ 3022.118059][T17478] netlink: 'syz-executor.4': attribute type 10 has an invalid length.
[ 3022.131838][T17480] netlink: 'syz-executor.0': attribute type 10 has an invalid length.
04:26:46 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3022.207476][T17491] netlink: 'syz-executor.2': attribute type 10 has an invalid length.
[ 3022.226336][T17491] netlink: 'syz-executor.2': attribute type 10 has an invalid length.
[ 3022.237844][T17482] netlink: 'syz-executor.0': attribute type 10 has an invalid length.
04:26:46 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:46 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xf000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:46 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848070000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3022.272885][T17484] netlink: 'syz-executor.3': attribute type 10 has an invalid length.
04:26:46 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000c02800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:46 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000902800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:46 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r1 = socket$kcm(0x10, 0x2, 0x0)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0xff, 0x0}, 0x8)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@ifindex, 0xd, 0x1, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map, r0, 0x12, 0x24, 0x0, @link_id=r2, r3}, 0x20)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:46 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x2c00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:46 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xf0ffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:46 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848080000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3022.522797][T17504] bridge0: port 3(team0) entered disabled state
04:26:46 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (async, rerun: 32)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async, rerun: 32)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r1 = socket$kcm(0x10, 0x2, 0x0) (async)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0xff, 0x0}, 0x8) (async)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@ifindex, 0xd, 0x1, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map, r0, 0x12, 0x24, 0x0, @link_id=r2, r3}, 0x20)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3022.671880][T17512] bridge0: port 3(team0) entered blocking state
[ 3022.689999][T17512] bridge0: port 3(team0) entered disabled state
[ 3022.707966][T17512] bridge0: port 3(team0) entered blocking state
[ 3022.714530][T17512] bridge0: port 3(team0) entered forwarding state
04:26:47 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848090000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:47 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000a02800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:47 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000e02800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:47 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:47 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x4800, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:47 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 32)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64)
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (async, rerun: 64)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r1 = socket$kcm(0x10, 0x2, 0x0) (async, rerun: 32)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0xff, 0x0}, 0x8) (async, rerun: 32)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@ifindex, 0xd, 0x1, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map, r0, 0x12, 0x24, 0x0, @link_id=r2, r3}, 0x20)
sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3022.916419][T17534] __nla_validate_parse: 44 callbacks suppressed
[ 3022.916446][T17534] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
04:26:47 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000c02800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3022.964916][T17531] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
04:26:47 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3023.034578][T17532] bridge0: port 3(team0) entered disabled state
04:26:47 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000000}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3023.167118][T17540] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 3023.188185][T17541] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
04:26:47 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x4c00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3023.215277][T17541] bridge0: port 3(team0) entered blocking state
[ 3023.227981][T17541] bridge0: port 3(team0) entered disabled state
04:26:47 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480a0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:47 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000f02800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:47 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:47 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000000}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3023.277837][T17541] bridge0: port 3(team0) entered blocking state
[ 3023.284519][T17541] bridge0: port 3(team0) entered forwarding state
[ 3023.301741][T17547] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
04:26:47 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x5865, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:47 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000e02800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3023.469503][T17556] bridge0: port 3(team0) entered disabled state
[ 3023.598657][T17561] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 3023.612289][T17561] bridge0: port 3(team0) entered blocking state
[ 3023.619282][T17561] bridge0: port 3(team0) entered disabled state
[ 3023.634163][T17561] bridge0: port 3(team0) entered blocking state
[ 3023.640695][T17561] bridge0: port 3(team0) entered forwarding state
04:26:47 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000000}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0) (async)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:47 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400002c02800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:47 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x6000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3023.652988][T17564] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 3023.676950][T17571] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'.
04:26:48 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480b0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3023.712396][T17572] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'.
04:26:48 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000f02800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:48 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:48 executing program 1:
r0 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = getpid()
perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0xe1, 0xe5, 0x7, 0x6, 0x0, 0x1, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1000, 0x2, @perf_config_ext={0x2}, 0x1e104, 0x9, 0x5, 0x1, 0x8, 0x80, 0x0, 0x0, 0x375, 0x0, 0x7}, r1, 0xe, r0, 0x8)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r4 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="2a72fffff0ffffff1800000005000000293a5aef58f50000"], &(0x7f0000000640)='GPL\x00', 0x8, 0xd1, &(0x7f0000000680)=""/209, 0x40f00, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000007c0)={0x3, 0x7, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000800)=[0xffffffffffffffff, r2, r3, r3, r4, r4, r3, r2, r3], &(0x7f0000000840)=[{0x3, 0x2, 0xf, 0x5}, {0x0, 0x3, 0x2, 0x8}, {0x4, 0x1, 0x4}, {0x2, 0x2, 0xc, 0x5}, {0x0, 0x2, 0x1, 0x1}, {0x1, 0x1, 0x3}], 0x10, 0x9}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f00000005c0)='afs_edit_dir\x00', r5}, 0x10)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x3, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="a40deb9047525a5d8800e00051ec085aac8a5026f17caa141a2b8aa7a77461c76694770a8070b8496bb56fe8e0e07c5e0446775b9590be43274f7352be00bb8ce20408f686ff77ef31e9d238e93e66fb117a8b2fce19c6f888406e0ff68a0825c17464e2d6a4172665d61b6bcacab221ac95193a3d20b3d227dba38f6633796805ad871f9e41773abb9c83249068cec15f74e4774dc2a3f2287e662ead", 0x9d}, {&(0x7f0000000080)="6a0f2077998073946ca832c7948d2192ffb983514bfda321cd460a036424d7a06dd6753905a87800bc93743083e76dbc51b0bfe02e6d6b3a1a656dc5229b1e1bcb62871f1d8e8b11df0715b301e6eb188d26864b1bed99198a", 0x59}, {&(0x7f0000000280)="29687e0ea2d1dc9a27ef9e5358946c81247750863decd06a9a184a1d54777deecb26af31e8b3cebeaa340ca537cb5f415bb389fbb15cc0f040829b6f048d899aaa4f11e6752641b97aa0c2a6b73e0f7c110db027d58ccb3b95e5b5060df9", 0x5e}, {&(0x7f0000000440)="3504e330eb63b3a7b023e7a16d638ec9904779bef0b308540f6f5b4020a1ec70928d3c98e4e2dad6c5b51a376082d1893e1afa8c9e2022dd9ebf1a033b89f4f72644ce5a40e92e670aa2cd3415c5890657713cce7ef77c39612e78e51d1ff61053063b9ae6f31da461003b9b43e48629e422249d346b1492324066573f2020078cde459dce52", 0x86}], 0x4, &(0x7f00000025c0)=ANY=[@ANYBLOB="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"], 0x1208}, 0x10)
write$cgroup_type(r4, &(0x7f0000000500), 0x9)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3023.825749][T17579] bridge0: port 3(team0) entered disabled state
04:26:48 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x62ba, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:48 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3024.078305][T17584] batman_adv: batadv0: Adding interface: syz_tun
[ 3024.099191][T17584] batman_adv: batadv0: The MTU of interface syz_tun is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3024.166340][T17584] batman_adv: batadv0: Interface activated: syz_tun
[ 3024.200784][T17586] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 3024.213526][T17586] bridge0: port 3(team0) entered blocking state
[ 3024.222195][T17586] bridge0: port 3(team0) entered disabled state
[ 3024.231957][T17586] bridge0: port 3(team0) entered blocking state
[ 3024.238420][T17586] bridge0: port 3(team0) entered forwarding state
04:26:48 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400912a02800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:48 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480c0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:48 executing program 1:
r0 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r1 = getpid()
perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0xe1, 0xe5, 0x7, 0x6, 0x0, 0x1, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1000, 0x2, @perf_config_ext={0x2}, 0x1e104, 0x9, 0x5, 0x1, 0x8, 0x80, 0x0, 0x0, 0x375, 0x0, 0x7}, r1, 0xe, r0, 0x8) (async)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
r4 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="2a72fffff0ffffff1800000005000000293a5aef58f50000"], &(0x7f0000000640)='GPL\x00', 0x8, 0xd1, &(0x7f0000000680)=""/209, 0x40f00, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000007c0)={0x3, 0x7, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000800)=[0xffffffffffffffff, r2, r3, r3, r4, r4, r3, r2, r3], &(0x7f0000000840)=[{0x3, 0x2, 0xf, 0x5}, {0x0, 0x3, 0x2, 0x8}, {0x4, 0x1, 0x4}, {0x2, 0x2, 0xc, 0x5}, {0x0, 0x2, 0x1, 0x1}, {0x1, 0x1, 0x3}], 0x10, 0x9}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f00000005c0)='afs_edit_dir\x00', r5}, 0x10)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async)
r6 = socket$kcm(0x10, 0x3, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (async)
sendmsg$kcm(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="a40deb9047525a5d8800e00051ec085aac8a5026f17caa141a2b8aa7a77461c76694770a8070b8496bb56fe8e0e07c5e0446775b9590be43274f7352be00bb8ce20408f686ff77ef31e9d238e93e66fb117a8b2fce19c6f888406e0ff68a0825c17464e2d6a4172665d61b6bcacab221ac95193a3d20b3d227dba38f6633796805ad871f9e41773abb9c83249068cec15f74e4774dc2a3f2287e662ead", 0x9d}, {&(0x7f0000000080)="6a0f2077998073946ca832c7948d2192ffb983514bfda321cd460a036424d7a06dd6753905a87800bc93743083e76dbc51b0bfe02e6d6b3a1a656dc5229b1e1bcb62871f1d8e8b11df0715b301e6eb188d26864b1bed99198a", 0x59}, {&(0x7f0000000280)="29687e0ea2d1dc9a27ef9e5358946c81247750863decd06a9a184a1d54777deecb26af31e8b3cebeaa340ca537cb5f415bb389fbb15cc0f040829b6f048d899aaa4f11e6752641b97aa0c2a6b73e0f7c110db027d58ccb3b95e5b5060df9", 0x5e}, {&(0x7f0000000440)="3504e330eb63b3a7b023e7a16d638ec9904779bef0b308540f6f5b4020a1ec70928d3c98e4e2dad6c5b51a376082d1893e1afa8c9e2022dd9ebf1a033b89f4f72644ce5a40e92e670aa2cd3415c5890657713cce7ef77c39612e78e51d1ff61053063b9ae6f31da461003b9b43e48629e422249d346b1492324066573f2020078cde459dce52", 0x86}], 0x4, &(0x7f00000025c0)=ANY=[@ANYBLOB="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"], 0x1208}, 0x10) (async)
write$cgroup_type(r4, &(0x7f0000000500), 0x9) (async)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:48 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400655802800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:48 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x6558, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:48 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3024.412622][T17602] batman_adv: batadv0: Adding interface: ip6gretap0
[ 3024.425296][T17602] batman_adv: batadv0: The MTU of interface ip6gretap0 is too small (1434) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3024.467707][T17602] batman_adv: batadv0: Interface activated: ip6gretap0
[ 3024.507487][T17608] bridge0: port 3(team0) entered disabled state
04:26:48 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x6800, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:48 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r0 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = getpid()
perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0xe1, 0xe5, 0x7, 0x6, 0x0, 0x1, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1000, 0x2, @perf_config_ext={0x2}, 0x1e104, 0x9, 0x5, 0x1, 0x8, 0x80, 0x0, 0x0, 0x375, 0x0, 0x7}, r1, 0xe, r0, 0x8)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0) (async)
r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r4 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="2a72fffff0ffffff1800000005000000293a5aef58f50000"], &(0x7f0000000640)='GPL\x00', 0x8, 0xd1, &(0x7f0000000680)=""/209, 0x40f00, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000007c0)={0x3, 0x7, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000800)=[0xffffffffffffffff, r2, r3, r3, r4, r4, r3, r2, r3], &(0x7f0000000840)=[{0x3, 0x2, 0xf, 0x5}, {0x0, 0x3, 0x2, 0x8}, {0x4, 0x1, 0x4}, {0x2, 0x2, 0xc, 0x5}, {0x0, 0x2, 0x1, 0x1}, {0x1, 0x1, 0x3}], 0x10, 0x9}, 0x90) (async)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="2a72fffff0ffffff1800000005000000293a5aef58f50000"], &(0x7f0000000640)='GPL\x00', 0x8, 0xd1, &(0x7f0000000680)=""/209, 0x40f00, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000007c0)={0x3, 0x7, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000800)=[0xffffffffffffffff, r2, r3, r3, r4, r4, r3, r2, r3], &(0x7f0000000840)=[{0x3, 0x2, 0xf, 0x5}, {0x0, 0x3, 0x2, 0x8}, {0x4, 0x1, 0x4}, {0x2, 0x2, 0xc, 0x5}, {0x0, 0x2, 0x1, 0x1}, {0x1, 0x1, 0x3}], 0x10, 0x9}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f00000005c0)='afs_edit_dir\x00', r5}, 0x10)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x3, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="a40deb9047525a5d8800e00051ec085aac8a5026f17caa141a2b8aa7a77461c76694770a8070b8496bb56fe8e0e07c5e0446775b9590be43274f7352be00bb8ce20408f686ff77ef31e9d238e93e66fb117a8b2fce19c6f888406e0ff68a0825c17464e2d6a4172665d61b6bcacab221ac95193a3d20b3d227dba38f6633796805ad871f9e41773abb9c83249068cec15f74e4774dc2a3f2287e662ead", 0x9d}, {&(0x7f0000000080)="6a0f2077998073946ca832c7948d2192ffb983514bfda321cd460a036424d7a06dd6753905a87800bc93743083e76dbc51b0bfe02e6d6b3a1a656dc5229b1e1bcb62871f1d8e8b11df0715b301e6eb188d26864b1bed99198a", 0x59}, {&(0x7f0000000280)="29687e0ea2d1dc9a27ef9e5358946c81247750863decd06a9a184a1d54777deecb26af31e8b3cebeaa340ca537cb5f415bb389fbb15cc0f040829b6f048d899aaa4f11e6752641b97aa0c2a6b73e0f7c110db027d58ccb3b95e5b5060df9", 0x5e}, {&(0x7f0000000440)="3504e330eb63b3a7b023e7a16d638ec9904779bef0b308540f6f5b4020a1ec70928d3c98e4e2dad6c5b51a376082d1893e1afa8c9e2022dd9ebf1a033b89f4f72644ce5a40e92e670aa2cd3415c5890657713cce7ef77c39612e78e51d1ff61053063b9ae6f31da461003b9b43e48629e422249d346b1492324066573f2020078cde459dce52", 0x86}], 0x4, &(0x7f00000025c0)=ANY=[@ANYBLOB="d0000000000000001901000005000000025598542d4a8b5592313cfb791ba96681dacb50e4ce6e52b501c9847776967398c42554d174ac2027fb223765542e05726ea61502e74d225e5b22dd40430611c724f56eb958b52444e0ecb8cdb17bb950d5d8abd48e2013cd8c476e47763e0c627ed030b217445eac6377d359e1aa5535c11c138df0433d07edf9c3388f90b16d8112553051c43d132b140b032a57ae0d35fa33790c59da11b00981ccecf09182103f786a9508dd69aab240d144cafcff9595a721558ef003d67373335e225590000000000000008800000058bfffff33b13260cd205188944e0088e9c1c274b2d0b421313e583428163fd24ab9a34d27d124530a560a6dfb03da64b089d54e3eba82469fc3cd8fbc2523adaa60d3bdb2d022cc32d4a0def8fec4f9d1889baea91f052c174d88ef3b99c0042da94e1603490efe2afc4a7469b49b2ca51fd31080b6324ed5826e226887cc200000000058000000000000002b13e3dbae00000069952c5993ee9eb9c908e0d621f3986ea8aac0cceb71d7c585e1de3f19f71f506a9df318e49c4aa967e841052cb72bd80e97b585dcc5eae7c079643c3fbc8a3cf6fb097200000000101000000000000084000000cd0000007c5d689b4ab3d1ddd266b7c4c9ba182c3bc01b7826c34d826ca088cad02b8dd75b9be97521faa838415240ac9817676c15a4987031ee4c5a873b23653ab5dd8fadc8b4f0ecf97c4ffe0d96b38ef7f6f4726b8898105c88d39dd9c6f24631a9152470378dcf5cd7cda3a87ea3b0ada9669ac3d2ebacb301d2108b31c89e06930219c4161dbb0a248fd749901322d1784ec38b7f7d462e12cb73b438b523905d3db1cba9d5bc3332fe19ad4e083378721715dfe784532ba8c01f61270da3715d889afcc769540d0a471f4ae3ab2606c206c05dac895163e76d391da50393eb6bcc71919815504af079afda56e71a2e9e79fa6df3d7621d08f1f9879d59aaf9143f613adbf62b3b213a4676dee379facad62849eab009922a0fea35e587f47bd15d8be723934b7fa4f8d7a161a4dd5d1bd0156289e338598a39e9afd45301c8692baa29d0ad7b3419a40995701e98b3c1376abe78bd72b8e56ce0811dd62bf88cffd1dc163ad9e2a153d09c6f5b99688638062846aa0003baf922ec8eef5bf9daac91a866f7a7c0c17e05c1bd9195bf571b9768c49f077dcc9941a8fdb1446029ad76d9ca52c700d15ff345d88cc07a9acb38b5a50d864509813cd33094a7f74502d33b03942eb3fe6572f084f33f77123b8098c1c03adda9b8f13f4f0fc3738eb1425a1eb0b7fab2fe71822cac2e9035df36252dc4ba701e01f9650ca4bd9d9cc1e28239131cdb7c67c36ed6e06ca73e7ed48d946fe4c9f4ea43274c00d712697280e816d521e058aff1c875fe7f14cc3cfa7e00082f96290ce019a78d5c09362a68cae766a822414ab24eec140f8c056027b39c3d1d3ac13fad146396594ec83d95d359c3714396b8d29845e7904425c7c0ec543cfe27650df3596740862640e2d4f09e68a5a93bfc4c63992707c265ef512a1897e6f31b49b92826f847734e04e44c58b09883cdcba7d85b8ba83b559b18ff72dbae50d46f39b9371fbe6990bf3c704275695d12ad2aba77e142515ddfc5a626b04730860ef0a3b823f9d37a2b0096b67dca5f6c8001815372e13bc1513cc2d764dfc9c525b2a9384f348bcde7abdffaeaf7ed6e37af486e401c2fb4b2a0c9068c3ec49b9bc9eb7b7952ca2fd87b9bf6e97dee11143526d37206991929d02d716838094e91cd97cb09e9ebe13dce92935053200fd8e73601c1bcfb8330975ba24a83b1133bd24fa7960d24cb669b02aac7793f7508b58cf7dc912425f0877f8363569b5380edb7203a6262a1b1afe37fa0bca21f3daf54fe449ea2f755455ed3d7c12fe324ab00b69bf070ee0f1921d894cc009724de2a47bfac08abb9c25c0aca697defae4cc5af8784343a26772e394bbe4fa3a40ca815d18844a296e8821b437824573599b8aad2da1cfdef872c9ecd7008ae8bd0ae354ee251ef1194c435bdfa97f9ae29fe3298d30ae89f64b128b86a8b36f8c9cf57069d51ed812f016eaa0adfdd1537613188eda45d35403d290e8b4edebaf06406af703c5c31c626a70253853696e6944a5b84eedd2962ea07bf14f93afa991fcb1763fc564ec17122093ef4dbbe5f59bc65b3d06fbe26ff19d7a9a830143e4ba2a0f32f728e906d2ab82f018cceeffa97a6d89e55a544af4b444963b6a04f2f9f9b2fafecaf37e5afff5656e25a4ed4cc5f202dc47cf9037a95729735c527f5d115c3b55ff6cf8e3f453842c0a10e7446408c1c207b0d0036c24692ac3fccaafcfa13cc6b3872235d96fe74e99cf8c827778786ebc0edb321a49833e0b194400c4f19a0c384c18b5268b4f7a67cc13155d35dec75cd41c762a086848adbd328a601379de2c3ef38216259f6a3f348e4971b588b7ea35a85f272a2abf462598e9376dfc657de42ae986582c01f669441f72f1354a465c64c1ab14471d88e6a90064627b9269133a7a984a7f817d1a8e5871d5b53bdf22810ba694d496f86670676f75ee64e3c2fa8d251ac34f8ed140b5d2eb95dad82c29be2c2242282df6d241e3cea18ef7da2825fdf02749268082467d34a068eae924118db146c9f8b306d6d2ec30040d047bd963657189e55d10563bbc277482d0d3e4ce51a2e42eaf35c6c186e7cd8354496f5d1301f52c53365cec0107f76176080237a67cc0fa26d5bacde926c27da91610cebfcb8873fef1e6cd55a5dadf0d0d8ccc54eced02183502570f1348f8458af3092fcb652856cea173067b6df4b3076af65350c0f100d4f1d3071e8a11393dd2e0b8874343904f0771691233f7b367748510f549b3c6483c923cde1c4ad14521cc8e79254297d7c24ca7be4b4be8ae1d0a8b63fcb22bae0118e32fbb76f1be17a469f45123edd6ea4c7e4df164faadab3b12fc16b591f9df8018bee9eebacd02730a1df13e7e51d955a981cdf1624a5d5e515995a27b264a856b1736979b6525512160f05bf5648d06a8412c1b2f250fc8a111577f71136b8342a819e4846e5e7f5162f6d8e8d934f9b8afd0d465ffcc6f75eff0e4c5cd93e6c15b5c32562a5c98630071b3e41098b5bcb42a40c8a91b763cd57065c0b4f3e999ad757b06a664a64fa14f6c6e29814dad0e8041dc49ee872529dc5c7cbad773450e3c4df81f3bc411175d8b90c0862ea9ca95bc47029dba2f4256cfc607b77fe015211f29cda107b32c0e9dc48b39d69e752a24fff7c07146e6353857f50da104049257c202b6855329212f4c8bc18ae71f5eaf0907d541df193a86ccd70e5838e3cbe59fd434036724e28ff9b17cc0c5630546537c6826ba27a6d7e77eb63bc13bfad12bdcd297ddd2d6a020d3a8104a96e66918970bba35b86956dc6cc402e50d34ef15ac5a2a8be09038b036f647192d80460e429a70c17990edab3abd03ab37a7aafc8bfdcc96bf1671670c4ac8972a46456667a81def3d0924cabaf374e5c0b12ebca21c70f7b6bacd7616f0b0111e30465efb74b65933dfee9225fb08257a91d48b4b96f1892a462f92d996d87b4c7fa2560a56e230e21174615b9e7f557c384ed267d14d85a7c645c1bcd51d15cae42e1cb699f5f4a03e26d2c6e248f9e76d7fbff300e03cbc1e8c070978041c71f9456f2d0909e6141a22044e6ed8a9712087dcdbe89dc9125ccad5c448776a7cdb7f4d04595508a0e8a8c83643b99ee1ade68b7548e69fdf6a4ebfa9cb6dfa0c87d38f48d75dfbca94f25e31ec9b4ff61de827304b75be86ec472db6a94250d6723f9cc0e76d16a2a632329fb71f06030c3b0300b5a49ec2b80f3f84805685792909f549ea5f162c6181a7a191b5dfddc1d1aa8bc8d97eef88fe8957b19bc601ebd053cc6abd925f263be0e19a43583af2b4b4bd7ac629400cc8b7d72fa3b7f64ef7d457bb0ce18a0f1bfd26b06833d78ed5ccb2a2c9e2b2a5f5950a015b237fbd00f7edde1e22f61d86fac5967eca9b45fad4716ce9a7340c9d5054049f577a2949b99e7a361a09089b46ee8cbd1258cff164aaf12a2143afbae28a6d08933f2d779a7a9617e02fd222d29d34288c9b8c054cfe1c1c71174ead34021ce22eb916adde5be68fdcd517c233bd4adf628c6449e635de3a871ce9e17e2fbcc3aa9e9516e00c721a8ef91da91e3c0ee2361ccc0213d0c44e91f922aff3af508c721b596fb76b377fcc359a9f8de5c04192805a54e6d7d1b821fcdc82654fc1dc5cc636da78b645fe81d836655b5d5aa6a90af0f18cade6f6ae3287e662d728b360e870f0f74f3e3c4fba3db7f364dadaeb5fa14b83c21441cbf7fb662847ff57927a1ce53d74c091f6fbd770a0888ef71be49e79b3046ed5c4ddb3939dfb75b79cfad194e65937b62d7722aec35b6c2a09e95eb4855090035060389b74edc707f981fb25fbbb8d320c32b8010680f9b274db8dffdf7bc81bcfa665a3dfb7aa59f370c9a8bbe6f400bcbf4e2174265b06c98c28c6a0ef4c234bfb612edbabc167515bd1d376ef4fb44ea14eee2fdcf86644db2671f2d89a4b3cebc3e36d66a3795f119c19167d25ccff8aa1fae63758ef6e1ff1d4e4f041d75f26745a395943ba5e1a53d99dbe35dd72c6ef3ab441db01c26aae5e1ab42bf4856e2f642bf4afbb8d1b3a8db2741b0d994464ca7629e63eb67d137401bce3ccfef7c97d3c73cb6044146996956e113a7e2d89a317b9fddf25545bc771064e4f718fea60c8622454f8f7b4f2362db20124fb09a475383edde28faf9652511f51062a3fea75e2ff142058e1230c305d719d5f8c25c23545fadf7857c7d89e757fe4a2326d0b17dc2d2231dc75edbd89eb01dd2d6069762664e5396bae2a18c09b34c94c9e7578b5a280e2c5e2652b25662c4496a80d5868d3b0114d367e68097107ee6c31789ce59b956242c0fc88e07a6b1f1e9670a19f3004eb16d9072289a6e44e37e60cf31977a874cdd030db802eac66f8b8078428b636b2644a1f7be8ccfa6cb86d5a711585a067819e6a9cdebafd93174d902ad6d5c8492d5e5e86b2bd06cbf45869d6a6584a0feccadf493caff299875762fcb55de09e69406e672643275aafeee2e9864aa55c3ec47db704d027a7e545ce2308cd5fe9f941901d146033ace17c8badebafb66380a6d5809d5f0b33e2335f50cdea73c19474e52082196988c5a46dc18cd874fc6d953ca9206c6bcc22d8d59a0ee801c0ab8f7a5c835ec8c570cb5bef3db35fc6de41f751deee1267681fe9d1a2cf9bdfa75b32f53e75c654e00b95c4506265bb4748e1fb9a15b3cfff62b2725f6a672362224cb494a020c0b2fe4e2b0b82a0de83d2b00b234656226fac0c5809e303c14b6ecf7cfecc1a0d85c463d8eb7a120885eb295f30376e495ae84a52d75a50d6e97476f4d80ba6b18684a443a435e7545233cb8453b237a8c6da9fc2b614784be4c1cb21108bd676f3c0a0b6b713784478070ea444a91a16856430cdfb58b553ba4978a9bb9a4e470c013a6dde95e89a77bbb5bb2abdb4a867679661eca22cc9d79263c94d9c56d4b12ea71ac101feed5829e3066b0046e33bed5e6ba0a23cc0b3deab8ae8a1ec562ceb4b09ef07efc6c2e1ad3c5da859c269f5f39abd20430f5d209306b2d5185241edf2e8f5c3288cf2b38b9066cbd5428ab230dbcf3fdabd732fd7676b7ec7ec1d0a8a8e9f819c43a95fefd6afa68d4e312c64749fe0cc0c7cbdeb80a6680fa2c0e514c1fa8ac5d9b3a099e4d31b10a0b5931cccacab9b6f4f044332c03825ca7ac3752ffe7ccca3a7d60d577f431ab55807264383a9110e2d6956453b37f07f8ec3cda94a5e99461c259d5b5fbce2df3efb44c96cedc5ec8e8772f7614f05c273efe55643abc046e214d65754a93d5594ac3c114396df05e8c63278782179a8f0d13e4cca36b20994b6db90694035de2c142b6c78a1a0683dc6910959925ae6d22ec6e4a6460e6b853195a06b1049c19bfb1e53c73ee1e908630ec1ac81553b4ee5a3ef4a7383c3b632a13065ce190a85914ec0c37984bcf1e7d41db9d054aaf6e873bdb4342c4842bfc907c3d74aeac4f2948966a15247c313ac7325686c0e199d0ba227ffb79a4e640fba7eb8cf77b2bab6b781965a7d24e695c85aa97ff0bc4b577000000002a820ffed5873f8153d2d45c48a55a03ed5e49a92079013dda3962221c62477a4d0ed74899b815a601b9b2bc78c5e2fd4a4eba28c2769ca789392d430437ef65bc7b7e6a33edf8850aabe42bca0a472a9cb6919be630b5ab3ea48ffd0472afb3149b44a862abfda307390a3f4514272a6cb6fe7ec1c4fc7299ecccad27ff0f6187f3c6ae5a263a8e05b02ecb23d6ba9b8b50deb413aa96755d2d658ece9bfd95994ce1e297f5139cc92d5578081640000000000000001701000003000000a292cbc0fc2c256dce6d4fe4f1df0c380884544145fe104e016ee4aa1a9b03d67d60ffc7381566815297050000000000699498eb5bb4a4894ee44fa181ab2128230f452bc7e1ae19b341b45305d26425"], 0x1208}, 0x10)
write$cgroup_type(r4, &(0x7f0000000500), 0x9)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:48 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3024.561737][T17616] bridge0: port 3(team0) entered blocking state
[ 3024.581978][T17616] bridge0: port 3(team0) entered disabled state
[ 3024.624315][T17616] bridge0: port 3(team0) entered blocking state
[ 3024.630828][T17616] bridge0: port 3(team0) entered forwarding state
04:26:48 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400006002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:48 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8000000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:49 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400002c02800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
[ 3024.699857][T17622] batman_adv: batadv0: Adding interface: bridge0
04:26:49 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1021, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
close(0xffffffffffffffff)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3024.732800][T17622] batman_adv: batadv0: The MTU of interface bridge0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3024.788363][T17622] batman_adv: batadv0: Interface activated: bridge0
04:26:49 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x6c00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:49 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400655802800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:49 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480e0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:49 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:49 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400586502800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:49 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1021, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 32)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (rerun: 32)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
close(0xffffffffffffffff) (async)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) (async, rerun: 64)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async, rerun: 64)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:49 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x7400, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:49 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400006002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:49 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:49 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3025.205526][T17649] bridge0: port 3(team0) entered disabled state
[ 3025.326251][T17657] bridge0: port 3(team0) entered blocking state
[ 3025.333219][T17657] bridge0: port 3(team0) entered disabled state
[ 3025.343365][T17657] bridge0: port 3(team0) entered blocking state
[ 3025.349885][T17657] bridge0: port 3(team0) entered forwarding state
04:26:49 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400008102800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
[ 3025.379072][T17658] batman_adv: batadv0: Adding interface: bond0
[ 3025.386608][T17658] batman_adv: batadv0: The MTU of interface bond0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3025.425765][T17658] batman_adv: batadv0: Interface activated: bond0
04:26:49 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x7a00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
04:26:49 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xc000000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:49 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400586502800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:49 executing program 0:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848110000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:49 executing program 5:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a00140007cf02800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:49 executing program 1:
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1021, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
bpf$ITER_CREATE(0x21, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async, rerun: 32)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (rerun: 32)
bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async)
close(0xffffffffffffffff) (async)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async, rerun: 64)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (rerun: 64)
04:26:49 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980), 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, 0x0, 0x0, 0x0, 0xe7, &(0x7f0000000580)=""/231}, 0x90)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400008102800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
04:26:49 executing program 2:
r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x9)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xe000000, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0)
04:26:49 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x182b263b, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x6, 0x80, 0x1, 0x0, 0x1, 0x12800, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x43d9, 0x6}, 0x80400, 0x1000, 0x7f, 0x8, 0x1d49a678, 0x7, 0x5, 0x0, 0x2, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x5)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x9)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x800, 0x9e, &(0x7f00000003c0)=""/158, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90)
r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000980)={0x1b, 0x0, 0x0, 0xab04, 0x0, r1, 0x401, '\x00', 0x0, r1, 0x0, 0x4, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x19, 0x12, &(0x7f0000000c80)=ANY=[@ANYBLOB="98250000e921ae137fbbfde11879e3b28e3a29c85e2ea40b14fc2fc81bed1feb2d293adc696d4ea027cdd701454f304d3efebe6004738fb412e7eb6d32f7a853d25c5153af2c9e8d54a62bc810e7ae3ae1b2cc357b6d4a62cd9015b3b7fcf11dea077d1eec58fc9c6bbf314ec0fc23da9001ce37ebafea5567cd7db79bd52c8c302ce70cd4da0e50b7afd713d54143c3fd5c705794bb276b7fb84475b92cc2f1779eac7b9bf57d1132db1b7d61f576a2c1d6c835d42651f9b42a3792c4415ecbfe", @ANYRES32=r3, @ANYBLOB="00000000fb6a0000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e0bd00008500000006000000"], &(0x7f0000000540)='GPL\x00', 0x2, 0xe7, &(0x7f0000000580)=""/231, 0x41100, 0x8, '\x00', 0x0, 0x10, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x8}, 0x10, 0x0, r0, 0x7, &(0x7f0000000780)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r1], &(0x7f0000000ac0)=[{0x1, 0x1, 0x100000d, 0x2}, {0x3, 0x4, 0x9, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x3, 0x4, 0x9, 0xf}, {0x4, 0x3, 0x5, 0x9}, {0x3, 0x3, 0x10, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x5dd07124}, 0x90)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/225, 0x26, 0xe1, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x6, 0xb8, &(0x7f0000000840)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r6 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50)
[ 3025.849035][T17678] ==================================================================
[ 3025.857196][T17678] BUG: KASAN: slab-out-of-bounds in dsa_user_changeupper+0x61a/0x6e0
[ 3025.865337][T17678] Read of size 8 at addr ffff88807f75ec90 by task syz-executor.0/17678
[ 3025.873611][T17678]
[ 3025.875955][T17678] CPU: 0 PID: 17678 Comm: syz-executor.0 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0
[ 3025.886055][T17678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 3025.896151][T17678] Call Trace:
[ 3025.899463][T17678]
[ 3025.902420][T17678] dump_stack_lvl+0xd9/0x1b0
[ 3025.907084][T17678] print_report+0xc4/0x620
[ 3025.908596][ T1237] ieee802154 phy0 wpan0: encryption failed: -22
[ 3025.911535][T17678] ? __virt_addr_valid+0x5e/0x580
[ 3025.917880][ T1237] ieee802154 phy1 wpan1: encryption failed: -22
[ 3025.922782][T17678] ? __phys_addr+0xc6/0x140
[ 3025.922835][T17678] kasan_report+0xda/0x110
[ 3025.938057][T17678] ? dsa_user_changeupper+0x61a/0x6e0
[ 3025.943515][T17678] ? dsa_user_changeupper+0x61a/0x6e0
[ 3025.948952][T17678] dsa_user_changeupper+0x61a/0x6e0
[ 3025.954213][T17678] dsa_user_netdevice_event+0xd04/0x3480
[ 3025.959921][T17678] ? rcu_is_watching+0x12/0xb0
[ 3025.964757][T17678] ? lock_release+0x4bf/0x690
[ 3025.969454][T17678] ? irqentry_enter+0x2d/0x50
[ 3025.974154][T17678] ? dsa_user_change_conduit+0x7e0/0x7e0
[ 3025.979827][T17678] ? trace_irq_enable.constprop.0+0xd0/0x100
[ 3025.985886][T17678] ? notifier_call_chain+0x139/0x3b0
[ 3025.991209][T17678] notifier_call_chain+0xb6/0x3b0
[ 3025.996281][T17678] ? dsa_user_change_conduit+0x7e0/0x7e0
[ 3026.001956][T17678] call_netdevice_notifiers_info+0xbe/0x130
[ 3026.007897][T17678] __netdev_upper_dev_link+0x439/0x850
[ 3026.013402][T17678] ? __dev_change_net_namespace+0x12f0/0x12f0
[ 3026.019521][T17678] ? irqentry_enter+0x2d/0x50
[ 3026.024230][T17678] ? rcu_is_watching+0x12/0xb0
[ 3026.029027][T17678] ? ref_tracker_free+0x810/0x810
[ 3026.034082][T17678] ? batadv_hardif_get_by_netdev+0x262/0x420
[ 3026.040220][T17678] netdev_master_upper_dev_link+0xa0/0xd0
[ 3026.045980][T17678] ? netdev_upper_dev_link+0xc0/0xc0
[ 3026.051403][T17678] batadv_hardif_enable_interface+0x28a/0xd20
[ 3026.057502][T17678] batadv_softif_slave_add+0xee/0x130
[ 3026.062916][T17678] ? batadv_softif_slave_del+0x130/0x130
[ 3026.068590][T17678] do_set_master+0x1b5/0x220
[ 3026.073226][T17678] do_setlink+0xa4a/0x4090
[ 3026.077758][T17678] ? rtnl_bridge_getlink+0x8c0/0x8c0
[ 3026.083069][T17678] ? rcu_is_watching+0x12/0xb0
[ 3026.087865][T17678] ? trace_irq_enable.constprop.0+0xd0/0x100
[ 3026.093886][T17678] ? _raw_spin_unlock_irqrestore+0x3b/0x70
[ 3026.099728][T17678] ? ___ratelimit+0x24c/0x570
[ 3026.104438][T17678] ? idr_get_free+0xa30/0xa30
[ 3026.109147][T17678] ? lock_release+0x4bf/0x690
[ 3026.113877][T17678] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 3026.119838][T17678] ? __nla_validate_parse+0x615/0x28b0
[ 3026.125335][T17678] ? irqentry_enter+0x2d/0x50
[ 3026.130041][T17678] ? rcu_is_watching+0x12/0xb0
[ 3026.134853][T17678] ? trace_irq_enable.constprop.0+0xd0/0x100
[ 3026.140894][T17678] ? __dev_get_by_index+0x15/0x140
[ 3026.146041][T17678] __rtnl_newlink+0xc28/0x1940
[ 3026.150852][T17678] ? rtnl_link_unregister+0x260/0x260
[ 3026.156277][T17678] rtnl_newlink+0x67/0xa0
[ 3026.160640][T17678] ? __rtnl_newlink+0x1940/0x1940
[ 3026.165705][T17678] rtnetlink_rcv_msg+0x3c7/0xe00
[ 3026.170674][T17678] ? rtnl_fill_vf+0x490/0x490
[ 3026.175387][T17678] ? netlink_rcv_skb+0xcb/0x440
[ 3026.180293][T17678] netlink_rcv_skb+0x16b/0x440
[ 3026.185095][T17678] ? rtnl_fill_vf+0x490/0x490
[ 3026.189804][T17678] ? netlink_ack+0x1380/0x1380
[ 3026.194614][T17678] ? _raw_spin_unlock_irqrestore+0x3b/0x70
[ 3026.200462][T17678] ? __rcu_read_unlock+0x2af/0x580
[ 3026.205610][T17678] ? netlink_deliver_tap+0x1a0/0xd00
[ 3026.210928][T17678] netlink_unicast+0x53b/0x810
[ 3026.215727][T17678] ? netlink_attachskb+0x880/0x880
[ 3026.220870][T17678] ? netlink_sendmsg+0x870/0xd70
[ 3026.225840][T17678] netlink_sendmsg+0x8b7/0xd70
[ 3026.230650][T17678] ? netlink_unicast+0x810/0x810
[ 3026.235621][T17678] ? bpf_lsm_socket_sendmsg+0x9/0x10
[ 3026.240966][T17678] ? netlink_unicast+0x810/0x810
[ 3026.245934][T17678] __sock_sendmsg+0xd5/0x180
[ 3026.250563][T17678] ____sys_sendmsg+0x6ac/0x940
[ 3026.255379][T17678] ? kernel_sendmsg+0x50/0x50
[ 3026.260125][T17678] ___sys_sendmsg+0x135/0x1d0
[ 3026.264870][T17678] ? do_recvmmsg+0x740/0x740
[ 3026.269510][T17678] ? rcu_is_watching+0x12/0xb0
[ 3026.274326][T17678] ? trace_irq_enable.constprop.0+0xd0/0x100
[ 3026.280369][T17678] ? __fget_light+0x173/0x200
[ 3026.285093][T17678] __sys_sendmsg+0x117/0x1e0
[ 3026.289725][T17678] ? __sys_sendmsg_sock+0x30/0x30
[ 3026.294782][T17678] ? kvm_sched_clock_read+0x11/0x20
[ 3026.300031][T17678] ? sched_clock_cpu+0x6d/0x4c0
[ 3026.304923][T17678] do_syscall_64+0xd3/0x250
[ 3026.309465][T17678] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 3026.315388][T17678] RIP: 0033:0x7fd7d1e7cda9
[ 3026.319822][T17678] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3026.339457][T17678] RSP: 002b:00007fd7d2c130c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 3026.347890][T17678] RAX: ffffffffffffffda RBX: 00007fd7d1fabf80 RCX: 00007fd7d1e7cda9
[ 3026.355883][T17678] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004
[ 3026.363873][T17678] RBP: 00007fd7d1ec947a R08: 0000000000000000 R09: 0000000000000000
[ 3026.371864][T17678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 3026.379851][T17678] R13: 000000000000000b R14: 00007fd7d1fabf80 R15: 00007fff3b2aafb8
[ 3026.387871][T17678]
[ 3026.390902][T17678]
[ 3026.393239][T17678] Allocated by task 12452:
[ 3026.397663][T17678] kasan_save_stack+0x33/0x50
[ 3026.402381][T17678] kasan_save_track+0x14/0x30
[ 3026.407091][T17678] __kasan_kmalloc+0xa2/0xb0
[ 3026.411717][T17678] __kmalloc_node+0x21b/0x460
[ 3026.416457][T17678] kvmalloc_node+0x99/0x1a0
[ 3026.421091][T17678] alloc_netdev_mqs+0xb3/0x12a0
[ 3026.425969][T17678] rtnl_create_link+0xc82/0xfb0
[ 3026.430852][T17678] __rtnl_newlink+0x10a1/0x1940
[ 3026.435723][T17678] rtnl_newlink+0x67/0xa0
[ 3026.440072][T17678] rtnetlink_rcv_msg+0x3c7/0xe00
[ 3026.445025][T17678] netlink_rcv_skb+0x16b/0x440
[ 3026.449818][T17678] netlink_unicast+0x53b/0x810
[ 3026.454655][T17678] netlink_sendmsg+0x8b7/0xd70
[ 3026.459453][T17678] __sock_sendmsg+0xd5/0x180
[ 3026.464214][T17678] __sys_sendto+0x225/0x310
[ 3026.468740][T17678] __x64_sys_sendto+0xe0/0x1b0
[ 3026.473541][T17678] do_syscall_64+0xd3/0x250
[ 3026.478076][T17678] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 3026.483991][T17678]
[ 3026.486327][T17678] The buggy address belongs to the object at ffff88807f75e000
[ 3026.486327][T17678] which belongs to the cache kmalloc-cg-4k of size 4096
[ 3026.500654][T17678] The buggy address is located 3216 bytes inside of
[ 3026.500654][T17678] allocated 3223-byte region [ffff88807f75e000, ffff88807f75ec97)
[ 3026.514990][T17678]
[ 3026.517323][T17678] The buggy address belongs to the physical page:
[ 3026.523743][T17678] page:ffffea0001fdd600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7f758
[ 3026.533921][T17678] head:ffffea0001fdd600 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 3026.542870][T17678] memcg:ffff88802fe6c581
[ 3026.547113][T17678] anon flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[ 3026.555541][T17678] page_type: 0xffffffff()
[ 3026.559889][T17678] raw: 00fff00000000840 ffff88801304f500 0000000000000000 dead000000000001
[ 3026.568494][T17678] raw: 0000000000000000 0000000000040004 00000001ffffffff ffff88802fe6c581
[ 3026.577115][T17678] page dumped because: kasan: bad access detected
[ 3026.583545][T17678] page_owner tracks the page as allocated
[ 3026.589268][T17678] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 12832, tgid 12832 (syz-executor.5), ts 1713752726265, free_ts 1713737648716
[ 3026.612748][T17678] post_alloc_hook+0x2d0/0x350
[ 3026.617550][T17678] get_page_from_freelist+0xa28/0x3780
[ 3026.623027][T17678] __alloc_pages+0x22f/0x2440
[ 3026.627722][T17678] new_slab+0xcc/0x3a0
[ 3026.631816][T17678] ___slab_alloc+0x4af/0x19a0
[ 3026.636526][T17678] __slab_alloc.constprop.0+0x56/0xa0
[ 3026.641928][T17678] __kmalloc_node_track_caller+0x35b/0x460
[ 3026.647768][T17678] kmemdup+0x29/0x60
[ 3026.651695][T17678] __devinet_sysctl_register+0xbc/0x360
[ 3026.657269][T17678] devinet_sysctl_register+0x173/0x200
[ 3026.662769][T17678] inetdev_init+0x28b/0x580
[ 3026.667295][T17678] inetdev_event+0x1191/0x19a0
[ 3026.672081][T17678] notifier_call_chain+0xb6/0x3b0
[ 3026.677149][T17678] call_netdevice_notifiers_info+0xbe/0x130
[ 3026.683097][T17678] register_netdevice+0x16e2/0x1da0
[ 3026.688318][T17678] veth_newlink+0x4f6/0xa10
[ 3026.692842][T17678] page last free pid 12832 tgid 12832 stack trace:
[ 3026.699364][T17678] free_unref_page_prepare+0x51f/0xb10
[ 3026.704861][T17678] free_unref_page+0x33/0x3c0
[ 3026.709580][T17678] qlist_free_all+0x58/0x150
[ 3026.714199][T17678] kasan_quarantine_reduce+0x18e/0x1d0
[ 3026.719687][T17678] __kasan_slab_alloc+0x65/0x90
[ 3026.724575][T17678] kmem_cache_alloc+0x136/0x320
[ 3026.729456][T17678] __kernfs_new_node+0xd3/0x890
[ 3026.734337][T17678] kernfs_new_node+0x94/0x110
[ 3026.739068][T17678] __kernfs_create_file+0x53/0x340
[ 3026.744217][T17678] sysfs_add_file_mode_ns+0x1ff/0x3b0
[ 3026.749627][T17678] internal_create_group+0x31c/0xb50
[ 3026.754957][T17678] internal_create_groups+0x9d/0x150
[ 3026.760263][T17678] device_add+0x706/0x1aa0
[ 3026.764713][T17678] netdev_register_kobject+0x187/0x3e0
[ 3026.770200][T17678] register_netdevice+0x1385/0x1da0
[ 3026.775416][T17678] veth_newlink+0x363/0xa10
[ 3026.779940][T17678]
[ 3026.782273][T17678] Memory state around the buggy address:
[ 3026.787913][T17678] ffff88807f75eb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 3026.795989][T17678] ffff88807f75ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 3026.804062][T17678] >ffff88807f75ec80: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 3026.812137][T17678] ^
[ 3026.816739][T17678] ffff88807f75ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 3026.824816][T17678] ffff88807f75ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 3026.832888][T17678] ==================================================================
[ 3026.864755][T17678] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 3026.872011][T17678] CPU: 0 PID: 17678 Comm: syz-executor.0 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0
[ 3026.882129][T17678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 3026.892244][T17678] Call Trace:
[ 3026.895576][T17678]
[ 3026.898545][T17678] dump_stack_lvl+0xd9/0x1b0
[ 3026.903199][T17678] panic+0x6dc/0x790
[ 3026.907153][T17678] ? panic_smp_self_stop+0xa0/0xa0
[ 3026.912425][T17678] ? rcu_is_watching+0x12/0xb0
[ 3026.917264][T17678] ? trace_irq_enable.constprop.0+0xd0/0x100
[ 3026.923289][T17678] ? preempt_schedule_thunk+0x1a/0x30
[ 3026.928716][T17678] ? preempt_schedule_common+0x45/0xc0
[ 3026.934283][T17678] check_panic_on_warn+0xab/0xb0
[ 3026.939276][T17678] end_report+0x108/0x150
[ 3026.943632][T17678] kasan_report+0xea/0x110
[ 3026.948073][T17678] ? dsa_user_changeupper+0x61a/0x6e0
[ 3026.953479][T17678] ? dsa_user_changeupper+0x61a/0x6e0
[ 3026.958893][T17678] dsa_user_changeupper+0x61a/0x6e0
[ 3026.964119][T17678] dsa_user_netdevice_event+0xd04/0x3480
[ 3026.969797][T17678] ? rcu_is_watching+0x12/0xb0
[ 3026.974597][T17678] ? lock_release+0x4bf/0x690
[ 3026.979334][T17678] ? irqentry_enter+0x2d/0x50
[ 3026.984059][T17678] ? dsa_user_change_conduit+0x7e0/0x7e0
[ 3026.989766][T17678] ? trace_irq_enable.constprop.0+0xd0/0x100
[ 3026.995814][T17678] ? notifier_call_chain+0x139/0x3b0
[ 3027.001129][T17678] notifier_call_chain+0xb6/0x3b0
[ 3027.006198][T17678] ? dsa_user_change_conduit+0x7e0/0x7e0
[ 3027.011878][T17678] call_netdevice_notifiers_info+0xbe/0x130
[ 3027.017803][T17678] __netdev_upper_dev_link+0x439/0x850
[ 3027.023308][T17678] ? __dev_change_net_namespace+0x12f0/0x12f0
[ 3027.029438][T17678] ? irqentry_enter+0x2d/0x50
[ 3027.034134][T17678] ? rcu_is_watching+0x12/0xb0
[ 3027.038923][T17678] ? ref_tracker_free+0x810/0x810
[ 3027.043970][T17678] ? batadv_hardif_get_by_netdev+0x262/0x420
[ 3027.049980][T17678] netdev_master_upper_dev_link+0xa0/0xd0
[ 3027.055756][T17678] ? netdev_upper_dev_link+0xc0/0xc0
[ 3027.061074][T17678] batadv_hardif_enable_interface+0x28a/0xd20
[ 3027.067160][T17678] batadv_softif_slave_add+0xee/0x130
[ 3027.072560][T17678] ? batadv_softif_slave_del+0x130/0x130
[ 3027.078226][T17678] do_set_master+0x1b5/0x220
[ 3027.082848][T17678] do_setlink+0xa4a/0x4090
[ 3027.087285][T17678] ? rtnl_bridge_getlink+0x8c0/0x8c0
[ 3027.092584][T17678] ? rcu_is_watching+0x12/0xb0
[ 3027.097381][T17678] ? trace_irq_enable.constprop.0+0xd0/0x100
[ 3027.103397][T17678] ? _raw_spin_unlock_irqrestore+0x3b/0x70
[ 3027.109301][T17678] ? ___ratelimit+0x24c/0x570
[ 3027.114009][T17678] ? idr_get_free+0xa30/0xa30
[ 3027.118721][T17678] ? lock_release+0x4bf/0x690
[ 3027.123434][T17678] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 3027.129399][T17678] ? __nla_validate_parse+0x615/0x28b0
[ 3027.134926][T17678] ? irqentry_enter+0x2d/0x50
[ 3027.139630][T17678] ? rcu_is_watching+0x12/0xb0
[ 3027.144457][T17678] ? trace_irq_enable.constprop.0+0xd0/0x100
[ 3027.150596][T17678] ? __dev_get_by_index+0x15/0x140
[ 3027.155735][T17678] __rtnl_newlink+0xc28/0x1940
[ 3027.160591][T17678] ? rtnl_link_unregister+0x260/0x260
[ 3027.166009][T17678] rtnl_newlink+0x67/0xa0
[ 3027.170369][T17678] ? __rtnl_newlink+0x1940/0x1940
[ 3027.175434][T17678] rtnetlink_rcv_msg+0x3c7/0xe00
[ 3027.180441][T17678] ? rtnl_fill_vf+0x490/0x490
[ 3027.185243][T17678] ? netlink_rcv_skb+0xcb/0x440
[ 3027.190175][T17678] netlink_rcv_skb+0x16b/0x440
[ 3027.194982][T17678] ? rtnl_fill_vf+0x490/0x490
[ 3027.199677][T17678] ? netlink_ack+0x1380/0x1380
[ 3027.204464][T17678] ? _raw_spin_unlock_irqrestore+0x3b/0x70
[ 3027.210301][T17678] ? __rcu_read_unlock+0x2af/0x580
[ 3027.215439][T17678] ? netlink_deliver_tap+0x1a0/0xd00
[ 3027.220782][T17678] netlink_unicast+0x53b/0x810
[ 3027.225597][T17678] ? netlink_attachskb+0x880/0x880
[ 3027.230760][T17678] ? netlink_sendmsg+0x870/0xd70
[ 3027.235732][T17678] netlink_sendmsg+0x8b7/0xd70
[ 3027.240530][T17678] ? netlink_unicast+0x810/0x810
[ 3027.245499][T17678] ? bpf_lsm_socket_sendmsg+0x9/0x10
[ 3027.250830][T17678] ? netlink_unicast+0x810/0x810
[ 3027.255794][T17678] __sock_sendmsg+0xd5/0x180
[ 3027.260424][T17678] ____sys_sendmsg+0x6ac/0x940
[ 3027.265224][T17678] ? kernel_sendmsg+0x50/0x50
[ 3027.269945][T17678] ___sys_sendmsg+0x135/0x1d0
[ 3027.274677][T17678] ? do_recvmmsg+0x740/0x740
[ 3027.279316][T17678] ? rcu_is_watching+0x12/0xb0
[ 3027.284140][T17678] ? trace_irq_enable.constprop.0+0xd0/0x100
[ 3027.290174][T17678] ? __fget_light+0x173/0x200
[ 3027.294904][T17678] __sys_sendmsg+0x117/0x1e0
[ 3027.299534][T17678] ? __sys_sendmsg_sock+0x30/0x30
[ 3027.304600][T17678] ? kvm_sched_clock_read+0x11/0x20
[ 3027.309836][T17678] ? sched_clock_cpu+0x6d/0x4c0
[ 3027.314715][T17678] do_syscall_64+0xd3/0x250
[ 3027.319250][T17678] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 3027.325182][T17678] RIP: 0033:0x7fd7d1e7cda9
[ 3027.329631][T17678] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3027.349259][T17678] RSP: 002b:00007fd7d2c130c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 3027.357705][T17678] RAX: ffffffffffffffda RBX: 00007fd7d1fabf80 RCX: 00007fd7d1e7cda9
[ 3027.365688][T17678] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004
[ 3027.373683][T17678] RBP: 00007fd7d1ec947a R08: 0000000000000000 R09: 0000000000000000
[ 3027.381693][T17678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 3027.389676][T17678] R13: 000000000000000b R14: 00007fd7d1fabf80 R15: 00007fff3b2aafb8
[ 3027.397697][T17678]
[ 3027.400939][T17678] Kernel Offset: disabled
[ 3027.405271][T17678] Rebooting in 86400 seconds..