$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 773.514295][T15828] batman_adv: batadv0: Interface activated: team0 [ 773.565412][T15825] batman_adv: batadv0: Adding interface: team0 [ 773.581915][T15825] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:12 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0x4c) [ 773.612954][T15825] batman_adv: batadv0: Interface activated: team0 07:27:12 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010088188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 773.640935][T15831] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 773.658651][T15831] batman_adv: batadv0: Interface deactivated: team0 [ 773.673317][T15831] batman_adv: batadv0: Removing interface: team0 [ 773.684635][T15831] bridge0: port 3(team0) entered blocking state [ 773.702841][T15831] bridge0: port 3(team0) entered disabled state [ 773.714033][T15831] team0: entered allmulticast mode [ 773.723866][T15831] team_slave_0: entered allmulticast mode [ 773.731251][T15831] team_slave_1: entered allmulticast mode [ 773.745473][T15831] bridge0: port 3(team0) entered blocking state 07:27:12 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010098188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 773.752074][T15831] bridge0: port 3(team0) entered forwarding state [ 773.769128][T15832] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. [ 773.780320][T15832] batman_adv: batadv0: Interface deactivated: team0 07:27:12 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0x4c) 07:27:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 773.802218][T15832] batman_adv: batadv0: Removing interface: team0 07:27:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:13 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:13 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000100a8188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 773.878016][T15837] syzkaller1: entered promiscuous mode [ 773.917208][T15837] syzkaller1: entered allmulticast mode 07:27:13 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0x4c) [ 774.146136][T15861] team0: left allmulticast mode [ 774.155761][T15861] team_slave_0: left allmulticast mode [ 774.161481][T15861] team_slave_1: left allmulticast mode [ 774.215654][T15861] bridge0: port 3(team0) entered disabled state 07:27:13 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x4c) 07:27:13 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000100c8188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 774.263391][T15861] batman_adv: batadv0: Adding interface: team0 [ 774.310629][T15861] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:13 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x4c) [ 774.430748][T15861] batman_adv: batadv0: Interface activated: team0 07:27:13 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000100e8188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:13 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000}, 0x4c) 07:27:13 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000100f8188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 774.568341][T15860] batman_adv: batadv0: Adding interface: team0 [ 774.591131][T15860] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 774.628113][T15860] batman_adv: batadv0: Interface activated: team0 [ 774.644686][T15864] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. [ 774.657085][T15864] batman_adv: batadv0: Interface deactivated: team0 07:27:13 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x4c) 07:27:13 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010108188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 774.677726][T15864] batman_adv: batadv0: Removing interface: team0 [ 774.694200][T15867] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 774.710238][T15867] batman_adv: batadv0: Interface deactivated: team0 [ 774.724350][T15867] batman_adv: batadv0: Removing interface: team0 07:27:13 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4301}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @multicast}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000d80)}], 0x1}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000f40)={'veth1_macvtap\x00'}) [ 774.752928][T15867] bridge0: port 3(team0) entered blocking state [ 774.768797][T15867] bridge0: port 3(team0) entered disabled state [ 774.780144][T15867] team0: entered allmulticast mode [ 774.791444][T15867] team_slave_0: entered allmulticast mode 07:27:13 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000102c8188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:13 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x4c) [ 774.812583][T15867] team_slave_1: entered allmulticast mode 07:27:14 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 774.859718][T15867] bridge0: port 3(team0) entered blocking state [ 774.866264][T15867] bridge0: port 3(team0) entered forwarding state 07:27:14 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 07:27:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:14 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010488188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:14 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x4c) 07:27:14 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000104c8188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:14 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x4c) 07:27:14 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010608188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 775.475415][T15888] syzkaller1: entered promiscuous mode [ 775.481265][T15888] syzkaller1: entered allmulticast mode 07:27:14 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4301}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0xa, 0x2) (async) r0 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @multicast}) (async) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @multicast}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000d80)}], 0x1}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000f40)={'veth1_macvtap\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000f40)={'veth1_macvtap\x00'}) 07:27:14 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x4c) 07:27:14 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:14 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010688188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:14 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x4c) [ 775.668210][T15907] validate_nla: 8 callbacks suppressed [ 775.673802][T15907] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 775.716304][T15907] team0: left allmulticast mode [ 775.730305][T15907] team_slave_0: left allmulticast mode [ 775.744498][T15907] team_slave_1: left allmulticast mode 07:27:14 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000106c8188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 775.768510][T15907] bridge0: port 3(team0) entered disabled state 07:27:14 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x4c) [ 775.834563][T15907] batman_adv: batadv0: Adding interface: team0 [ 775.863584][T15907] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 775.932588][T15907] batman_adv: batadv0: Interface activated: team0 [ 775.952673][T15911] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 07:27:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010748188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:15 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x4c) [ 775.986984][T15911] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 776.008455][T15911] batman_adv: batadv0: Interface deactivated: team0 [ 776.015428][T15911] batman_adv: batadv0: Removing interface: team0 07:27:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000107a8188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 776.052017][T15911] bridge0: port 3(team0) entered blocking state [ 776.063400][T15911] bridge0: port 3(team0) entered disabled state [ 776.074572][T15911] team0: entered allmulticast mode [ 776.081100][T15911] team_slave_0: entered allmulticast mode [ 776.090229][T15911] team_slave_1: entered allmulticast mode 07:27:15 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 776.102538][T15911] bridge0: port 3(team0) entered blocking state [ 776.109139][T15911] bridge0: port 3(team0) entered forwarding state 07:27:15 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x4c) 07:27:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188020f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 776.284209][T15924] syzkaller1: entered promiscuous mode [ 776.310225][T15924] syzkaller1: entered allmulticast mode 07:27:15 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}, 0x4c) 07:27:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188030f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 776.483697][T15950] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 776.502737][T15951] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 07:27:15 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:15 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x4c) [ 776.544142][T15951] team0: left allmulticast mode [ 776.553940][T15951] team_slave_0: left allmulticast mode [ 776.565033][T15951] team_slave_1: left allmulticast mode [ 776.574291][T15951] bridge0: port 3(team0) entered disabled state [ 776.625135][T15951] batman_adv: batadv0: Adding interface: team0 [ 776.641020][T15951] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:15 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x4c) [ 776.677272][T15951] batman_adv: batadv0: Interface activated: team0 [ 776.688504][T15953] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 776.703022][T15953] batman_adv: batadv0: Adding interface: team0 07:27:15 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x4c) [ 776.711079][T15953] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 776.754403][T15953] batman_adv: batadv0: Interface activated: team0 [ 776.809667][T15958] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 776.818235][T15958] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. [ 776.829184][T15958] batman_adv: batadv0: Interface deactivated: team0 [ 776.839285][T15958] batman_adv: batadv0: Removing interface: team0 [ 776.855153][T15957] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 776.865856][T15957] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 776.876249][T15957] batman_adv: batadv0: Interface deactivated: team0 [ 776.883209][T15957] batman_adv: batadv0: Removing interface: team0 [ 776.894861][T15957] bridge0: port 3(team0) entered blocking state 07:27:16 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x4c) 07:27:16 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 07:27:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 776.911965][T15957] bridge0: port 3(team0) entered disabled state [ 776.940796][T15957] team0: entered allmulticast mode [ 776.946951][T15957] team_slave_0: entered allmulticast mode [ 776.953011][T15957] team_slave_1: entered allmulticast mode [ 776.964190][T15957] bridge0: port 3(team0) entered blocking state [ 776.970789][T15957] bridge0: port 3(team0) entered forwarding state [ 776.997869][T15960] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 07:27:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:16 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}, 0x4c) 07:27:16 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 777.019666][T15974] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 07:27:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x23019) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x4, 0x34, 0xff, 0x7, 0x0, 0xffffffffffff0001, 0x41002, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xdcf, 0x1, @perf_bp={&(0x7f0000000240), 0x4}, 0x81800, 0x6, 0x5, 0xa, 0x6, 0x4, 0x0, 0x0, 0xa6, 0x0, 0x3}, r5, 0xd, r3, 0x8) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2c, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x24, 0x0, &(0x7f0000000200)="1db6423ff5a95a0dff0930dd28439ea65088a1d6920a06534927d0486f36f82451a5eb05", 0x0, 0x82f4, 0x0, 0x26, 0x0, &(0x7f0000000280)="40210a858716a0f40b873d7fa0f36892d8aecd4d1cb2b6db11eccc974e1bc62f96a823921e25", 0x0, 0x2, 0x0, 0x2}, 0x50) 07:27:16 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188050f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 777.106279][T15974] batman_adv: batadv0: Adding interface: team0 [ 777.112688][T15974] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:16 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}, 0x4c) 07:27:16 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x4c) [ 777.336877][T15974] batman_adv: batadv0: Interface activated: team0 [ 777.369882][T15985] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 777.381838][T15985] team0: left allmulticast mode [ 777.402130][T15985] team_slave_0: left allmulticast mode [ 777.418640][T15985] team_slave_1: left allmulticast mode [ 777.439103][T15985] bridge0: port 3(team0) entered disabled state 07:27:16 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x4c) [ 777.509755][T15985] batman_adv: batadv0: Adding interface: team0 [ 777.528926][T15985] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 777.585668][T15985] batman_adv: batadv0: Interface activated: team0 07:27:16 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x4c) 07:27:16 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188060f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 777.633273][T15989] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 777.652630][T15989] batman_adv: batadv0: Interface deactivated: team0 [ 777.662947][T15989] batman_adv: batadv0: Removing interface: team0 [ 777.675373][T15989] bridge0: port 3(team0) entered blocking state [ 777.687083][T15989] bridge0: port 3(team0) entered disabled state [ 777.693727][T15989] team0: entered allmulticast mode [ 777.700103][T15989] team_slave_0: entered allmulticast mode [ 777.706697][T15989] team_slave_1: entered allmulticast mode [ 777.716570][T15989] bridge0: port 3(team0) entered blocking state [ 777.723098][T15989] bridge0: port 3(team0) entered forwarding state 07:27:16 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x4c) 07:27:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 777.736021][T15976] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. [ 777.763573][T15976] batman_adv: batadv0: Interface deactivated: team0 [ 777.774582][T15976] batman_adv: batadv0: Removing interface: team0 07:27:16 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:17 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188070f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) (async) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) (async) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x23019) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x4, 0x34, 0xff, 0x7, 0x0, 0xffffffffffff0001, 0x41002, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xdcf, 0x1, @perf_bp={&(0x7f0000000240), 0x4}, 0x81800, 0x6, 0x5, 0xa, 0x6, 0x4, 0x0, 0x0, 0xa6, 0x0, 0x3}, r5, 0xd, r3, 0x8) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2c, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x24, 0x0, &(0x7f0000000200)="1db6423ff5a95a0dff0930dd28439ea65088a1d6920a06534927d0486f36f82451a5eb05", 0x0, 0x82f4, 0x0, 0x26, 0x0, &(0x7f0000000280)="40210a858716a0f40b873d7fa0f36892d8aecd4d1cb2b6db11eccc974e1bc62f96a823921e25", 0x0, 0x2, 0x0, 0x2}, 0x50) 07:27:17 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0x4c) 07:27:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x23019) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x4, 0x34, 0xff, 0x7, 0x0, 0xffffffffffff0001, 0x41002, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xdcf, 0x1, @perf_bp={&(0x7f0000000240), 0x4}, 0x81800, 0x6, 0x5, 0xa, 0x6, 0x4, 0x0, 0x0, 0xa6, 0x0, 0x3}, r5, 0xd, r3, 0x8) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2c, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x24, 0x0, &(0x7f0000000200)="1db6423ff5a95a0dff0930dd28439ea65088a1d6920a06534927d0486f36f82451a5eb05", 0x0, 0x82f4, 0x0, 0x26, 0x0, &(0x7f0000000280)="40210a858716a0f40b873d7fa0f36892d8aecd4d1cb2b6db11eccc974e1bc62f96a823921e25", 0x0, 0x2, 0x0, 0x2}, 0x50) [ 777.944746][T16006] team0: left allmulticast mode [ 777.955720][T16006] team_slave_0: left allmulticast mode [ 777.971517][T16006] team_slave_1: left allmulticast mode 07:27:17 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0x4c) [ 778.012040][T16006] bridge0: port 3(team0) entered disabled state 07:27:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async, rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async, rerun: 64) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) (async, rerun: 64) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x23019) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x4, 0x34, 0xff, 0x7, 0x0, 0xffffffffffff0001, 0x41002, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xdcf, 0x1, @perf_bp={&(0x7f0000000240), 0x4}, 0x81800, 0x6, 0x5, 0xa, 0x6, 0x4, 0x0, 0x0, 0xa6, 0x0, 0x3}, r5, 0xd, r3, 0x8) (async) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async, rerun: 64) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2c, &(0x7f00000000c0), 0x4) (rerun: 64) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) (async, rerun: 64) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (rerun: 64) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) (async) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x24, 0x0, &(0x7f0000000200)="1db6423ff5a95a0dff0930dd28439ea65088a1d6920a06534927d0486f36f82451a5eb05", 0x0, 0x82f4, 0x0, 0x26, 0x0, &(0x7f0000000280)="40210a858716a0f40b873d7fa0f36892d8aecd4d1cb2b6db11eccc974e1bc62f96a823921e25", 0x0, 0x2, 0x0, 0x2}, 0x50) 07:27:17 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0x4c) [ 778.160489][T16006] batman_adv: batadv0: Adding interface: team0 [ 778.187500][T16006] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 778.228942][T16006] batman_adv: batadv0: Interface activated: team0 07:27:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x23019) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x4, 0x34, 0xff, 0x7, 0x0, 0xffffffffffff0001, 0x41002, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xdcf, 0x1, @perf_bp={&(0x7f0000000240), 0x4}, 0x81800, 0x6, 0x5, 0xa, 0x6, 0x4, 0x0, 0x0, 0xa6, 0x0, 0x3}, r5, 0xd, r3, 0x8) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2c, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x24, 0x0, &(0x7f0000000200)="1db6423ff5a95a0dff0930dd28439ea65088a1d6920a06534927d0486f36f82451a5eb05", 0x0, 0x82f4, 0x0, 0x26, 0x0, &(0x7f0000000280)="40210a858716a0f40b873d7fa0f36892d8aecd4d1cb2b6db11eccc974e1bc62f96a823921e25", 0x0, 0x2, 0x0, 0x2}, 0x50) 07:27:17 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188080f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 778.272505][T16012] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 07:27:17 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x4c) [ 778.318767][T16012] batman_adv: batadv0: Interface deactivated: team0 [ 778.327448][T16012] batman_adv: batadv0: Removing interface: team0 [ 778.348391][T16012] bridge0: port 3(team0) entered blocking state [ 778.363013][T16012] bridge0: port 3(team0) entered disabled state [ 778.385138][T16012] team0: entered allmulticast mode [ 778.399419][T16012] team_slave_0: entered allmulticast mode [ 778.418730][T16012] team_slave_1: entered allmulticast mode [ 778.451595][T16012] bridge0: port 3(team0) entered blocking state [ 778.458184][T16012] bridge0: port 3(team0) entered forwarding state 07:27:17 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:17 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188090f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:17 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x4c) 07:27:17 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000}, 0x4c) [ 778.809060][T16043] team0: left allmulticast mode 07:27:17 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e000000100081880a0f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 778.834851][T16043] team_slave_0: left allmulticast mode [ 778.878392][T16043] team_slave_1: left allmulticast mode [ 778.894725][T16043] bridge0: port 3(team0) entered disabled state 07:27:18 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x4c) [ 778.967652][T16043] batman_adv: batadv0: Adding interface: team0 [ 778.995685][T16043] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 779.032574][T16043] batman_adv: batadv0: Interface activated: team0 07:27:18 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188100f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x23019) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x4, 0x34, 0xff, 0x7, 0x0, 0xffffffffffff0001, 0x41002, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xdcf, 0x1, @perf_bp={&(0x7f0000000240), 0x4}, 0x81800, 0x6, 0x5, 0xa, 0x6, 0x4, 0x0, 0x0, 0xa6, 0x0, 0x3}, r5, 0xd, r3, 0x8) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2c, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x24, 0x0, &(0x7f0000000200)="1db6423ff5a95a0dff0930dd28439ea65088a1d6920a06534927d0486f36f82451a5eb05", 0x0, 0x82f4, 0x0, 0x26, 0x0, &(0x7f0000000280)="40210a858716a0f40b873d7fa0f36892d8aecd4d1cb2b6db11eccc974e1bc62f96a823921e25", 0x0, 0x2, 0x0, 0x2}, 0x50) 07:27:18 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 779.061331][T16047] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 07:27:18 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x4c) [ 779.112885][T16047] batman_adv: batadv0: Interface deactivated: team0 [ 779.157444][T16047] batman_adv: batadv0: Removing interface: team0 [ 779.207542][T16047] bridge0: port 3(team0) entered blocking state [ 779.222871][T16047] bridge0: port 3(team0) entered disabled state [ 779.231569][T16047] team0: entered allmulticast mode [ 779.248354][T16047] team_slave_0: entered allmulticast mode 07:27:18 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 779.268936][T16047] team_slave_1: entered allmulticast mode [ 779.278777][T16047] bridge0: port 3(team0) entered blocking state [ 779.285321][T16047] bridge0: port 3(team0) entered forwarding state 07:27:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:18 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:18 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040280ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:18 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x4c) 07:27:18 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040380ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 779.584270][T16069] team0: left allmulticast mode [ 779.676020][T16069] team_slave_0: left allmulticast mode [ 779.699365][T16069] team_slave_1: left allmulticast mode [ 779.714397][T16069] bridge0: port 3(team0) entered disabled state 07:27:18 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x4c) [ 779.764755][T16069] batman_adv: batadv0: Adding interface: team0 [ 779.774016][T16069] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 779.799753][T16069] batman_adv: batadv0: Interface activated: team0 07:27:18 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x4c) [ 779.822410][T16073] team0: left allmulticast mode [ 779.834550][T16073] team_slave_0: left allmulticast mode [ 779.841035][T16073] team_slave_1: left allmulticast mode [ 779.854202][T16073] bridge0: port 3(team0) entered disabled state 07:27:19 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x4c) [ 779.884664][T16073] batman_adv: batadv0: Adding interface: team0 [ 779.897616][T16073] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 779.929206][T16073] batman_adv: batadv0: Interface activated: team0 [ 779.940286][T16074] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. [ 779.958889][T16074] batman_adv: batadv0: Interface deactivated: team0 [ 779.972538][T16074] batman_adv: batadv0: Removing interface: team0 07:27:19 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x4c) [ 779.981527][T16074] bridge0: port 3(team0) entered blocking state [ 779.989499][T16074] bridge0: port 3(team0) entered disabled state [ 779.999336][T16074] team0: entered allmulticast mode [ 780.004603][T16074] team_slave_0: entered allmulticast mode [ 780.012484][T16074] team_slave_1: entered allmulticast mode [ 780.024845][T16074] bridge0: port 3(team0) entered blocking state [ 780.031492][T16074] bridge0: port 3(team0) entered forwarding state [ 780.043570][T16076] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 07:27:19 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:19 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x4c) 07:27:19 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040480ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 780.075753][T16076] batman_adv: batadv0: Interface deactivated: team0 [ 780.089084][T16076] batman_adv: batadv0: Removing interface: team0 07:27:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000024c0)=@bloom_filter={0x1e, 0x0, 0x4, 0x7, 0xac8, r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000500)='\x00') r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x0, 0x3f, 0x81, 0x0, 0x1, 0x49, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000540)}, 0x20, 0x1, 0x5, 0x6, 0x2, 0x6, 0xbc5, 0x0, 0x0, 0x0, 0x800}, 0xffffffffffffffff, 0x0, r4, 0x2) r6 = getpid() perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x9, 0xc1, 0x7f, 0x2, 0x0, 0x5, 0x83040, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x6}, 0x0, 0x20, 0x1, 0x5, 0x8, 0x7, 0xf78, 0x0, 0x8}, r6, 0x5, 0xffffffffffffffff, 0xb) r7 = perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES8=r5, @ANYRESDEC=r3, @ANYRES8=r4, @ANYRES8, @ANYBLOB="79eda87fab570e7e05c1799a191df2aebc0a4641cf2ec94316e2379da96698929d3df954bb78bb19ebeb41dbea76bbbb189b2fbcde52e606ee7e86cf18aec48819d37e6dfdc57a0d3e3c1c3352f5953aa95566c15fd628731f1cd28515060bf775ac0c68ee5d3bd2cf1bf142dd3680e7002f7943bdcae96c353fd7f8ec73528a86da63", @ANYRES64=r6]) sendmsg$unix(r3, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000b40)}, {&(0x7f0000000b80)="c76e", 0x2}, {&(0x7f0000000bc0)="ad0370c0fff252c62463dc1421b5b2286433e0249e3bc8c93ef4465dc0a1105671678fd0f06a881b3634922268bbc658c0914226d02b538f638982144be3314f8778dc4301de285d53c375d47d8cd70278cad50f721e01c8e0bb1dd6f04a50011f8ecb78e6163eb2c49666b2bb3dd4afed310976e5", 0x75}, {&(0x7f0000000c40)="7a5946319216fc3a45bf412d5230af68c8267ef08212ee613c02d69653942e5ae5297733211a00f53ae9cc636c1957ed9a76745c496d031dbd66c3ef7718f525", 0x40}, {&(0x7f0000000c80)="ef02091d93f628eca767502cb4b812394a4b6cc9d08babd928d05f624ff63bcf5845b3c7dc5d4fe4c6904b4a1943472c98a95e34b19df6c7c9ab6f7fbbaac82c8ff239c365cfe500eb83fa25505a119588b0666d586262244e8733340a2993231e3c54f74c7d4c186b31f226b403f3f9deb59e250175de30d8cdd3ddff3937868860b4aa06400514e410a214dc56a87289932719903d66", 0x97}, {&(0x7f0000000d40)='q', 0x1}, {&(0x7f0000000d80)="15111f70252f079862fa3d003f35e7488504c6b2d425bb206a0e1861a029e59fc958ec6de997a637d1ab2283a84efe604419c0a0fcf4fd5248683f99ca6175b31c3fb796fe3f7193f47a76751f5c5da758847dff554101262640a411bae982752057b100a9dc01061f0e43de81146fad0d86a6c5", 0x74}], 0x7, 0x0, 0x0, 0x24000080}, 0x8000) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x180, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000000100)}, 0x20) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x17, &(0x7f0000000480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1000006, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000540)='GPL\x00', 0x8, 0x19, &(0x7f0000000580)=""/25, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6, 0x4}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r10, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000400), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xe46, '\x00', 0x0, r0, 0x0, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x5, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0xe8, &(0x7f0000000240)=""/232, 0x40f00, 0x8, '\x00', r11, 0xb, r9, 0x8, &(0x7f00000008c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0x3, 0x5fc5d930}, 0x10, 0x0, r2, 0x6, &(0x7f00000009c0)=[r2, r0, r8, r0, r2, r2, r0, r12, r9], &(0x7f0000000a00)=[{0x3, 0x4, 0x9, 0xb}, {0x3, 0x2, 0xe, 0x4}, {0x4, 0x3, 0xc, 0x9}, {0x3, 0x1, 0x0, 0x6bf76862d5e25e2}, {0x0, 0x3, 0x3, 0x1}, {0x0, 0x2, 0x10, 0xa}], 0x10, 0x8}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) [ 780.157945][T16076] bridge0: port 3(team0) entered blocking state [ 780.164461][T16076] bridge0: port 3(team0) entered disabled state [ 780.242829][T16076] team0: entered allmulticast mode [ 780.248228][T16076] team_slave_0: entered allmulticast mode [ 780.254120][T16076] team_slave_1: entered allmulticast mode [ 780.264136][T16076] bridge0: port 3(team0) entered blocking state [ 780.270699][T16076] bridge0: port 3(team0) entered forwarding state [ 780.283154][T16097] batman_adv: batadv0: Adding interface: team0 [ 780.304270][T16097] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:19 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x4c) 07:27:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:19 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040580ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 780.445200][T16097] batman_adv: batadv0: Interface activated: team0 [ 780.478829][T16102] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. 07:27:19 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}, 0x4c) [ 780.548115][T16102] batman_adv: batadv0: Interface deactivated: team0 [ 780.560632][T16102] batman_adv: batadv0: Removing interface: team0 [ 780.584877][T16106] team0: left allmulticast mode 07:27:19 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 780.598989][T16106] team_slave_0: left allmulticast mode [ 780.635767][T16106] team_slave_1: left allmulticast mode 07:27:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1d, 0x279b3981, 0x8, 0x2, 0x3, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x0, 0x5}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x1, 0x5, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@bloom_filter={0x1e, 0x0, 0x8, 0x0, 0x1a01, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0x7}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000000)={0x3, 0x0, [0x0, 0x0, 0x0]}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000500)=@raw=[@map_fd={0x18, 0x2}, @exit], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x0, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000680), 0x8, 0x10, &(0x7f00000006c0)={0x2, 0xc, 0xffffffff, 0x2}, 0x10, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000007c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001400)=[{0x0, 0x5, 0x0, 0x6}], 0x10, 0x441}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f0000000740)='%pK \x00'}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000a80)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="003255ed02040000000000950085b9cf4cad1b0000000000000000000000870771545d00f679219e933bb3f09642077fa36e"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x40f00, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x2, 0x1, 0xffffffff, 0x2}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001400)}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xb, 0x25, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0x76}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6e}}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xe89}, @ldst={0x0, 0x1, 0x0, 0x0, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffc0, 0xffffffffffffffff}, @map_idx_val={0x18, 0xa}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x28, &(0x7f0000000240)=""/40, 0x40f00, 0x68, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x1, &(0x7f0000000a00)=[0xffffffffffffffff, 0xffffffffffffffff, r2, r0, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000a40)=[{0x3, 0x0, 0xb, 0xc}], 0x10, 0x5ae}, 0x90) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000500)) r6 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r5}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x84613, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x5, &(0x7f00000003c0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf}], 0x0, 0x8, 0xbe, &(0x7f0000000800)=""/190, 0x41100, 0x66, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000900)={0x2, 0x10, 0x71, 0x100}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000005c0)=@o_path={&(0x7f0000000140)='./file0\x00', r0, 0x4000, r7}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) 07:27:19 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x4c) [ 780.705604][T16106] bridge0: port 3(team0) entered disabled state [ 780.805051][T16106] batman_adv: batadv0: Adding interface: team0 [ 780.843844][T16106] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 780.897310][T16106] batman_adv: batadv0: Interface activated: team0 [ 780.929704][T16108] validate_nla: 23 callbacks suppressed [ 780.929727][T16108] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 780.956760][T16110] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 780.964987][T16110] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 07:27:20 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x4c) 07:27:20 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040680ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 781.009501][T16110] batman_adv: batadv0: Interface deactivated: team0 [ 781.058334][T16110] batman_adv: batadv0: Removing interface: team0 07:27:20 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x4c) 07:27:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) (async) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000024c0)=@bloom_filter={0x1e, 0x0, 0x4, 0x7, 0xac8, r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000500)='\x00') r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x0, 0x3f, 0x81, 0x0, 0x1, 0x49, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000540)}, 0x20, 0x1, 0x5, 0x6, 0x2, 0x6, 0xbc5, 0x0, 0x0, 0x0, 0x800}, 0xffffffffffffffff, 0x0, r4, 0x2) (async) r6 = getpid() perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x9, 0xc1, 0x7f, 0x2, 0x0, 0x5, 0x83040, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x6}, 0x0, 0x20, 0x1, 0x5, 0x8, 0x7, 0xf78, 0x0, 0x8}, r6, 0x5, 0xffffffffffffffff, 0xb) r7 = perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES8=r5, @ANYRESDEC=r3, @ANYRES8=r4, @ANYRES8, @ANYBLOB="79eda87fab570e7e05c1799a191df2aebc0a4641cf2ec94316e2379da96698929d3df954bb78bb19ebeb41dbea76bbbb189b2fbcde52e606ee7e86cf18aec48819d37e6dfdc57a0d3e3c1c3352f5953aa95566c15fd628731f1cd28515060bf775ac0c68ee5d3bd2cf1bf142dd3680e7002f7943bdcae96c353fd7f8ec73528a86da63", @ANYRES64=r6]) sendmsg$unix(r3, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000b40)}, {&(0x7f0000000b80)="c76e", 0x2}, {&(0x7f0000000bc0)="ad0370c0fff252c62463dc1421b5b2286433e0249e3bc8c93ef4465dc0a1105671678fd0f06a881b3634922268bbc658c0914226d02b538f638982144be3314f8778dc4301de285d53c375d47d8cd70278cad50f721e01c8e0bb1dd6f04a50011f8ecb78e6163eb2c49666b2bb3dd4afed310976e5", 0x75}, {&(0x7f0000000c40)="7a5946319216fc3a45bf412d5230af68c8267ef08212ee613c02d69653942e5ae5297733211a00f53ae9cc636c1957ed9a76745c496d031dbd66c3ef7718f525", 0x40}, {&(0x7f0000000c80)="ef02091d93f628eca767502cb4b812394a4b6cc9d08babd928d05f624ff63bcf5845b3c7dc5d4fe4c6904b4a1943472c98a95e34b19df6c7c9ab6f7fbbaac82c8ff239c365cfe500eb83fa25505a119588b0666d586262244e8733340a2993231e3c54f74c7d4c186b31f226b403f3f9deb59e250175de30d8cdd3ddff3937868860b4aa06400514e410a214dc56a87289932719903d66", 0x97}, {&(0x7f0000000d40)='q', 0x1}, {&(0x7f0000000d80)="15111f70252f079862fa3d003f35e7488504c6b2d425bb206a0e1861a029e59fc958ec6de997a637d1ab2283a84efe604419c0a0fcf4fd5248683f99ca6175b31c3fb796fe3f7193f47a76751f5c5da758847dff554101262640a411bae982752057b100a9dc01061f0e43de81146fad0d86a6c5", 0x74}], 0x7, 0x0, 0x0, 0x24000080}, 0x8000) (async) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) close(0xffffffffffffffff) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x180, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000000100)}, 0x20) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x17, &(0x7f0000000480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1000006, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000540)='GPL\x00', 0x8, 0x19, &(0x7f0000000580)=""/25, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6, 0x4}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r10, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000400), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xe46, '\x00', 0x0, r0, 0x0, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x5, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0xe8, &(0x7f0000000240)=""/232, 0x40f00, 0x8, '\x00', r11, 0xb, r9, 0x8, &(0x7f00000008c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0x3, 0x5fc5d930}, 0x10, 0x0, r2, 0x6, &(0x7f00000009c0)=[r2, r0, r8, r0, r2, r2, r0, r12, r9], &(0x7f0000000a00)=[{0x3, 0x4, 0x9, 0xb}, {0x3, 0x2, 0xe, 0x4}, {0x4, 0x3, 0xc, 0x9}, {0x3, 0x1, 0x0, 0x6bf76862d5e25e2}, {0x0, 0x3, 0x3, 0x1}, {0x0, 0x2, 0x10, 0xa}], 0x10, 0x8}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) [ 781.114132][T16110] bridge0: port 3(team0) entered blocking state [ 781.121615][T16110] bridge0: port 3(team0) entered disabled state [ 781.153284][T16110] team0: entered allmulticast mode [ 781.161164][T16110] team_slave_0: entered allmulticast mode [ 781.167588][T16110] team_slave_1: entered allmulticast mode [ 781.179440][T16110] bridge0: port 3(team0) entered blocking state [ 781.186186][T16110] bridge0: port 3(team0) entered forwarding state [ 781.199257][T16125] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 07:27:20 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x4c) 07:27:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:20 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040780ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:20 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}, 0x4c) 07:27:20 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 781.519683][T16136] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 781.544332][T16138] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 07:27:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000024c0)=@bloom_filter={0x1e, 0x0, 0x4, 0x7, 0xac8, r3}, 0x48) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000500)='\x00') (async) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x0, 0x3f, 0x81, 0x0, 0x1, 0x49, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000540)}, 0x20, 0x1, 0x5, 0x6, 0x2, 0x6, 0xbc5, 0x0, 0x0, 0x0, 0x800}, 0xffffffffffffffff, 0x0, r4, 0x2) (async) r6 = getpid() perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x9, 0xc1, 0x7f, 0x2, 0x0, 0x5, 0x83040, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x6}, 0x0, 0x20, 0x1, 0x5, 0x8, 0x7, 0xf78, 0x0, 0x8}, r6, 0x5, 0xffffffffffffffff, 0xb) (async) r7 = perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES8=r5, @ANYRESDEC=r3, @ANYRES8=r4, @ANYRES8, @ANYBLOB="79eda87fab570e7e05c1799a191df2aebc0a4641cf2ec94316e2379da96698929d3df954bb78bb19ebeb41dbea76bbbb189b2fbcde52e606ee7e86cf18aec48819d37e6dfdc57a0d3e3c1c3352f5953aa95566c15fd628731f1cd28515060bf775ac0c68ee5d3bd2cf1bf142dd3680e7002f7943bdcae96c353fd7f8ec73528a86da63", @ANYRES64=r6]) (async) sendmsg$unix(r3, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000b40)}, {&(0x7f0000000b80)="c76e", 0x2}, {&(0x7f0000000bc0)="ad0370c0fff252c62463dc1421b5b2286433e0249e3bc8c93ef4465dc0a1105671678fd0f06a881b3634922268bbc658c0914226d02b538f638982144be3314f8778dc4301de285d53c375d47d8cd70278cad50f721e01c8e0bb1dd6f04a50011f8ecb78e6163eb2c49666b2bb3dd4afed310976e5", 0x75}, {&(0x7f0000000c40)="7a5946319216fc3a45bf412d5230af68c8267ef08212ee613c02d69653942e5ae5297733211a00f53ae9cc636c1957ed9a76745c496d031dbd66c3ef7718f525", 0x40}, {&(0x7f0000000c80)="ef02091d93f628eca767502cb4b812394a4b6cc9d08babd928d05f624ff63bcf5845b3c7dc5d4fe4c6904b4a1943472c98a95e34b19df6c7c9ab6f7fbbaac82c8ff239c365cfe500eb83fa25505a119588b0666d586262244e8733340a2993231e3c54f74c7d4c186b31f226b403f3f9deb59e250175de30d8cdd3ddff3937868860b4aa06400514e410a214dc56a87289932719903d66", 0x97}, {&(0x7f0000000d40)='q', 0x1}, {&(0x7f0000000d80)="15111f70252f079862fa3d003f35e7488504c6b2d425bb206a0e1861a029e59fc958ec6de997a637d1ab2283a84efe604419c0a0fcf4fd5248683f99ca6175b31c3fb796fe3f7193f47a76751f5c5da758847dff554101262640a411bae982752057b100a9dc01061f0e43de81146fad0d86a6c5", 0x74}], 0x7, 0x0, 0x0, 0x24000080}, 0x8000) (async) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x180, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000000100)}, 0x20) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x17, &(0x7f0000000480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1000006, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000540)='GPL\x00', 0x8, 0x19, &(0x7f0000000580)=""/25, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x6, 0x4}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r10, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000400), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) (async, rerun: 64) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xe46, '\x00', 0x0, r0, 0x0, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x5, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0xe8, &(0x7f0000000240)=""/232, 0x40f00, 0x8, '\x00', r11, 0xb, r9, 0x8, &(0x7f00000008c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0x3, 0x5fc5d930}, 0x10, 0x0, r2, 0x6, &(0x7f00000009c0)=[r2, r0, r8, r0, r2, r2, r0, r12, r9], &(0x7f0000000a00)=[{0x3, 0x4, 0x9, 0xb}, {0x3, 0x2, 0xe, 0x4}, {0x4, 0x3, 0xc, 0x9}, {0x3, 0x1, 0x0, 0x6bf76862d5e25e2}, {0x0, 0x3, 0x3, 0x1}, {0x0, 0x2, 0x10, 0xa}], 0x10, 0x8}, 0x90) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) [ 781.584999][T16138] team0: left allmulticast mode [ 781.602645][T16138] team_slave_0: left allmulticast mode 07:27:20 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040880ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:20 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}, 0x4c) 07:27:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1d, 0x279b3981, 0x8, 0x2, 0x3, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x0, 0x5}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x1, 0x5, 0x3}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@bloom_filter={0x1e, 0x0, 0x8, 0x0, 0x1a01, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0x7}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000000)={0x3, 0x0, [0x0, 0x0, 0x0]}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000500)=@raw=[@map_fd={0x18, 0x2}, @exit], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x0, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000680), 0x8, 0x10, &(0x7f00000006c0)={0x2, 0xc, 0xffffffff, 0x2}, 0x10, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000007c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001400)=[{0x0, 0x5, 0x0, 0x6}], 0x10, 0x441}, 0x90) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f0000000740)='%pK \x00'}, 0x20) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000a80)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="003255ed02040000000000950085b9cf4cad1b0000000000000000000000870771545d00f679219e933bb3f09642077fa36e"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x40f00, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x2, 0x1, 0xffffffff, 0x2}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001400)}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xb, 0x25, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0x76}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6e}}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xe89}, @ldst={0x0, 0x1, 0x0, 0x0, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffc0, 0xffffffffffffffff}, @map_idx_val={0x18, 0xa}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x28, &(0x7f0000000240)=""/40, 0x40f00, 0x68, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x1, &(0x7f0000000a00)=[0xffffffffffffffff, 0xffffffffffffffff, r2, r0, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000a40)=[{0x3, 0x0, 0xb, 0xc}], 0x10, 0x5ae}, 0x90) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) close(r0) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000500)) (async) r6 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r5}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x84613, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) close(r7) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x5, &(0x7f00000003c0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf}], 0x0, 0x8, 0xbe, &(0x7f0000000800)=""/190, 0x41100, 0x66, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000900)={0x2, 0x10, 0x71, 0x100}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000005c0)=@o_path={&(0x7f0000000140)='./file0\x00', r0, 0x4000, r7}, 0x18) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) [ 781.633133][T16138] team_slave_1: left allmulticast mode [ 781.661049][T16138] bridge0: port 3(team0) entered disabled state 07:27:20 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x4c) [ 781.799304][T16138] batman_adv: batadv0: Adding interface: team0 [ 781.808452][T16138] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:21 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x4c) [ 781.871869][T16138] batman_adv: batadv0: Interface activated: team0 [ 781.907296][T16143] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 07:27:21 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x4c) [ 781.918662][T16143] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 781.932632][T16143] batman_adv: batadv0: Interface deactivated: team0 [ 781.939513][T16143] batman_adv: batadv0: Removing interface: team0 [ 781.953008][T16143] bridge0: port 3(team0) entered blocking state [ 781.970963][T16143] bridge0: port 3(team0) entered disabled state [ 781.979101][T16143] team0: entered allmulticast mode [ 781.984604][T16143] team_slave_0: entered allmulticast mode [ 781.995192][T16143] team_slave_1: entered allmulticast mode [ 782.005640][T16143] bridge0: port 3(team0) entered blocking state [ 782.012164][T16143] bridge0: port 3(team0) entered forwarding state 07:27:21 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040980ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 782.021359][T16151] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 07:27:21 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x4c) 07:27:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1d, 0x279b3981, 0x8, 0x2, 0x3, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x0, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1d, 0x279b3981, 0x8, 0x2, 0x3, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x0, 0x5}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x1, 0x5, 0x3}, 0x48) (async) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x1, 0x5, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@bloom_filter={0x1e, 0x0, 0x8, 0x0, 0x1a01, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0x7}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000000)={0x3, 0x0, [0x0, 0x0, 0x0]}) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000000)={0x3, 0x0, [0x0, 0x0, 0x0]}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000500)=@raw=[@map_fd={0x18, 0x2}, @exit], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x0, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000680), 0x8, 0x10, &(0x7f00000006c0)={0x2, 0xc, 0xffffffff, 0x2}, 0x10, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000007c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001400)=[{0x0, 0x5, 0x0, 0x6}], 0x10, 0x441}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000500)=@raw=[@map_fd={0x18, 0x2}, @exit], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x0, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000680), 0x8, 0x10, &(0x7f00000006c0)={0x2, 0xc, 0xffffffff, 0x2}, 0x10, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000007c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001400)=[{0x0, 0x5, 0x0, 0x6}], 0x10, 0x441}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f0000000740)='%pK \x00'}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000a80)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="003255ed02040000000000950085b9cf4cad1b0000000000000000000000870771545d00f679219e933bb3f09642077fa36e"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x40f00, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x2, 0x1, 0xffffffff, 0x2}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001400)}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xb, 0x25, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0x76}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6e}}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xe89}, @ldst={0x0, 0x1, 0x0, 0x0, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffc0, 0xffffffffffffffff}, @map_idx_val={0x18, 0xa}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x28, &(0x7f0000000240)=""/40, 0x40f00, 0x68, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x1, &(0x7f0000000a00)=[0xffffffffffffffff, 0xffffffffffffffff, r2, r0, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000a40)=[{0x3, 0x0, 0xb, 0xc}], 0x10, 0x5ae}, 0x90) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) (async) close(r0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000500)) r6 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r5}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x84613, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r7) (async) close(r7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x5, &(0x7f00000003c0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf}], 0x0, 0x8, 0xbe, &(0x7f0000000800)=""/190, 0x41100, 0x66, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000900)={0x2, 0x10, 0x71, 0x100}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x5, &(0x7f00000003c0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf}], 0x0, 0x8, 0xbe, &(0x7f0000000800)=""/190, 0x41100, 0x66, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000900)={0x2, 0x10, 0x71, 0x100}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000005c0)=@o_path={&(0x7f0000000140)='./file0\x00', r0, 0x4000, r7}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) 07:27:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 782.189990][T16167] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 07:27:21 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x4c) 07:27:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040a80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 782.261375][T16174] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 782.300829][T16174] team0: left allmulticast mode 07:27:21 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0x4c) [ 782.318796][T16174] team_slave_0: left allmulticast mode [ 782.345907][T16174] team_slave_1: left allmulticast mode [ 782.353057][T16174] bridge0: port 3(team0) entered disabled state 07:27:21 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0x4c) [ 782.397922][T16174] batman_adv: batadv0: Adding interface: team0 [ 782.404914][T16174] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 782.430885][T16174] batman_adv: batadv0: Interface activated: team0 07:27:21 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 782.449447][T16177] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 782.472552][T16177] team0: left allmulticast mode [ 782.490124][T16177] team_slave_0: left allmulticast mode 07:27:21 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0x4c) [ 782.505383][T16177] team_slave_1: left allmulticast mode [ 782.521410][T16177] bridge0: port 3(team0) entered disabled state 07:27:21 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x4c) [ 782.560246][T16177] batman_adv: batadv0: Adding interface: team0 [ 782.578377][T16177] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 782.636794][T16177] batman_adv: batadv0: Interface activated: team0 07:27:21 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x4c) [ 782.730853][T16180] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. [ 782.740561][T16180] batman_adv: batadv0: Interface deactivated: team0 [ 782.750627][T16180] batman_adv: batadv0: Removing interface: team0 [ 782.759809][T16180] bridge0: port 3(team0) entered blocking state [ 782.766924][T16180] bridge0: port 3(team0) entered disabled state [ 782.773440][T16180] team0: entered allmulticast mode 07:27:21 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000}, 0x4c) [ 782.784009][T16180] team_slave_0: entered allmulticast mode [ 782.789865][T16180] team_slave_1: entered allmulticast mode [ 782.802482][T16180] bridge0: port 3(team0) entered blocking state [ 782.809076][T16180] bridge0: port 3(team0) entered forwarding state [ 782.824059][T16184] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 07:27:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040b80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 782.835798][T16184] batman_adv: batadv0: Interface deactivated: team0 [ 782.848941][T16184] batman_adv: batadv0: Removing interface: team0 07:27:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 782.881661][T16184] bridge0: port 3(team0) entered blocking state [ 782.901574][T16184] bridge0: port 3(team0) entered disabled state [ 782.920067][T16184] team0: entered allmulticast mode 07:27:22 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x4c) 07:27:22 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 782.932183][T16184] team_slave_0: entered allmulticast mode [ 782.939738][T16184] team_slave_1: entered allmulticast mode [ 782.952143][T16184] bridge0: port 3(team0) entered blocking state [ 782.958712][T16184] bridge0: port 3(team0) entered forwarding state 07:27:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:22 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x4c) [ 783.107721][T16203] team0: left allmulticast mode 07:27:22 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040c80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 783.114923][T16203] team_slave_0: left allmulticast mode [ 783.153255][T16203] team_slave_1: left allmulticast mode [ 783.164135][T16203] bridge0: port 3(team0) entered disabled state 07:27:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:22 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 07:27:22 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0xffffffffffffffe7, 0x0, 0x0}, 0x4c) [ 783.322499][T16203] batman_adv: batadv0: Adding interface: team0 [ 783.330665][T16203] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 783.356688][T16203] batman_adv: batadv0: Interface activated: team0 [ 783.371795][T16206] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. [ 783.397492][T16206] batman_adv: batadv0: Interface deactivated: team0 [ 783.411000][T16206] batman_adv: batadv0: Removing interface: team0 07:27:22 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0xffffffffffffffe7, 0x0, 0x0}, 0x4c) [ 783.420529][T16206] bridge0: port 3(team0) entered blocking state [ 783.429759][T16206] bridge0: port 3(team0) entered disabled state [ 783.437438][T16206] team0: entered allmulticast mode [ 783.443010][T16206] team_slave_0: entered allmulticast mode [ 783.449544][T16206] team_slave_1: entered allmulticast mode [ 783.464744][T16206] bridge0: port 3(team0) entered blocking state [ 783.471342][T16206] bridge0: port 3(team0) entered forwarding state [ 783.482185][T16211] team0: left allmulticast mode [ 783.495228][T16211] team_slave_0: left allmulticast mode [ 783.514000][T16211] team_slave_1: left allmulticast mode 07:27:22 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80680000}]}, &(0x7f00000002c0)='syzkaller\x00', 0x67a8, 0x74, &(0x7f0000000300)=""/116, 0x41000, 0x5a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x7, 0x70, 0x7}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0xffffffffffffffff], &(0x7f0000000440)=[{0x1, 0x5, 0x3, 0x8}, {0x0, 0x1, 0xd, 0xb}], 0x10, 0x1}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x4, 0x0, 0x8, 0x1, 0x0, 0x4, 0x800, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x3, @perf_bp={&(0x7f0000000000), 0x5}, 0x2c29, 0x100, 0x7, 0x8, 0x10001, 0xff, 0x9, 0x0, 0x4, 0x0, 0x1}, r2, 0xb, r1, 0x6) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) 07:27:22 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async, rerun: 32) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0xffffffffffffffe7, 0x0, 0x0}, 0x4c) [ 783.524042][T16211] bridge0: port 3(team0) entered disabled state 07:27:22 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000005000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 783.585293][T16211] batman_adv: batadv0: Adding interface: team0 [ 783.597477][T16211] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 783.634027][T16211] batman_adv: batadv0: Interface activated: team0 [ 783.650727][T16215] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 783.660413][T16215] batman_adv: batadv0: Interface deactivated: team0 [ 783.667880][T16215] batman_adv: batadv0: Removing interface: team0 07:27:22 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000005000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 783.701468][T16215] bridge0: port 3(team0) entered blocking state [ 783.709080][T16215] bridge0: port 3(team0) entered disabled state [ 783.723540][T16215] team0: entered allmulticast mode [ 783.729870][T16215] team_slave_0: entered allmulticast mode [ 783.738392][T16215] team_slave_1: entered allmulticast mode [ 783.764010][T16215] bridge0: port 3(team0) entered blocking state [ 783.770577][T16215] bridge0: port 3(team0) entered forwarding state [ 783.806205][T16219] batman_adv: batadv0: Adding interface: team0 [ 783.812587][T16219] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:23 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000005000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 07:27:23 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040d80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:23 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 783.890275][T16219] batman_adv: batadv0: Interface activated: team0 [ 783.913072][T16223] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. [ 784.005897][T16223] batman_adv: batadv0: Interface deactivated: team0 07:27:23 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) close(r1) 07:27:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 784.142475][T16223] batman_adv: batadv0: Removing interface: team0 [ 784.166284][T16246] team0: left allmulticast mode [ 784.175758][T16246] team_slave_0: left allmulticast mode 07:27:23 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040e80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 784.210211][T16246] team_slave_1: left allmulticast mode [ 784.254032][T16246] bridge0: port 3(team0) entered disabled state [ 784.343345][T16246] batman_adv: batadv0: Adding interface: team0 07:27:23 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) close(r1) [ 784.369448][T16246] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 784.399839][T16246] batman_adv: batadv0: Interface activated: team0 [ 784.419387][T16249] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 784.434351][T16249] batman_adv: batadv0: Interface deactivated: team0 [ 784.447093][T16249] batman_adv: batadv0: Removing interface: team0 [ 784.479795][T16249] bridge0: port 3(team0) entered blocking state 07:27:23 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) close(r1) (async) close(r1) 07:27:23 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80680000}]}, &(0x7f00000002c0)='syzkaller\x00', 0x67a8, 0x74, &(0x7f0000000300)=""/116, 0x41000, 0x5a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x7, 0x70, 0x7}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0xffffffffffffffff], &(0x7f0000000440)=[{0x1, 0x5, 0x3, 0x8}, {0x0, 0x1, 0xd, 0xb}], 0x10, 0x1}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x4, 0x0, 0x8, 0x1, 0x0, 0x4, 0x800, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x3, @perf_bp={&(0x7f0000000000), 0x5}, 0x2c29, 0x100, 0x7, 0x8, 0x10001, 0xff, 0x9, 0x0, 0x4, 0x0, 0x1}, r2, 0xb, r1, 0x6) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80680000}]}, &(0x7f00000002c0)='syzkaller\x00', 0x67a8, 0x74, &(0x7f0000000300)=""/116, 0x41000, 0x5a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x7, 0x70, 0x7}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0xffffffffffffffff], &(0x7f0000000440)=[{0x1, 0x5, 0x3, 0x8}, {0x0, 0x1, 0xd, 0xb}], 0x10, 0x1}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) (async) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) (async) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x4, 0x0, 0x8, 0x1, 0x0, 0x4, 0x800, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x3, @perf_bp={&(0x7f0000000000), 0x5}, 0x2c29, 0x100, 0x7, 0x8, 0x10001, 0xff, 0x9, 0x0, 0x4, 0x0, 0x1}, r2, 0xb, r1, 0x6) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r3}, 0x10) (async) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) (async) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) (async) [ 784.495002][T16249] bridge0: port 3(team0) entered disabled state [ 784.505337][T16249] team0: entered allmulticast mode [ 784.517295][T16249] team_slave_0: entered allmulticast mode [ 784.531514][T16249] team_slave_1: entered allmulticast mode 07:27:23 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 784.541803][T16249] bridge0: port 3(team0) entered blocking state [ 784.548379][T16249] bridge0: port 3(team0) entered forwarding state [ 784.574403][T16256] batman_adv: batadv0: Adding interface: team0 07:27:23 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188041080ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 784.606058][T16256] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 784.658741][T16256] batman_adv: batadv0: Interface activated: team0 07:27:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 784.713255][T16258] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. [ 784.735115][T16258] batman_adv: batadv0: Interface deactivated: team0 [ 784.742698][T16258] batman_adv: batadv0: Removing interface: team0 07:27:23 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x23000) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@var={0xf, 0x0, 0x0, 0xe, 0x1}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @volatile={0xf, 0x0, 0x0, 0x9, 0x1}]}, {0x0, [0x61, 0x61, 0x0, 0x61, 0x2e, 0x0, 0x2e]}}, &(0x7f00000003c0)=""/53, 0x49, 0x35, 0x0, 0x4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x13, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_fd={0x18, 0x2, 0x1, 0x0, r0}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xe4, &(0x7f00000001c0)=""/228, 0x41100, 0x60, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000440)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000740)=[{0x0, 0x3, 0xc, 0x5}, {0x0, 0x4, 0x5, 0x1}, {0x1, 0x1, 0x2, 0xa}, {0x2, 0x2, 0xe}], 0x10, 0x69}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x9, 0x0, r3, 0x7fff, '\x00', 0x0, r2, 0x4, 0x5, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 07:27:23 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188041180ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 784.839021][T16274] team0: left allmulticast mode [ 784.855430][T16274] team_slave_0: left allmulticast mode [ 784.871659][T16274] team_slave_1: left allmulticast mode [ 784.933182][T16274] bridge0: port 3(team0) entered disabled state 07:27:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:24 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x23000) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@var={0xf, 0x0, 0x0, 0xe, 0x1}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @volatile={0xf, 0x0, 0x0, 0x9, 0x1}]}, {0x0, [0x61, 0x61, 0x0, 0x61, 0x2e, 0x0, 0x2e]}}, &(0x7f00000003c0)=""/53, 0x49, 0x35, 0x0, 0x4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x13, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_fd={0x18, 0x2, 0x1, 0x0, r0}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xe4, &(0x7f00000001c0)=""/228, 0x41100, 0x60, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000440)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000740)=[{0x0, 0x3, 0xc, 0x5}, {0x0, 0x4, 0x5, 0x1}, {0x1, 0x1, 0x2, 0xa}, {0x2, 0x2, 0xe}], 0x10, 0x69}, 0x90) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x9, 0x0, r3, 0x7fff, '\x00', 0x0, r2, 0x4, 0x5, 0x2}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 785.195204][T16274] batman_adv: batadv0: Adding interface: team0 [ 785.202006][T16274] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 785.236046][T16274] batman_adv: batadv0: Interface activated: team0 07:27:24 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188041280ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 785.271141][T16278] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 785.296609][T16278] batman_adv: batadv0: Interface deactivated: team0 07:27:24 executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x23000) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@var={0xf, 0x0, 0x0, 0xe, 0x1}, @ptr={0x9, 0x0, 0x0, 0x2, 0x3}, @volatile={0xf, 0x0, 0x0, 0x9, 0x1}]}, {0x0, [0x61, 0x61, 0x0, 0x61, 0x2e, 0x0, 0x2e]}}, &(0x7f00000003c0)=""/53, 0x49, 0x35, 0x0, 0x4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x13, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_fd={0x18, 0x2, 0x1, 0x0, r0}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xe4, &(0x7f00000001c0)=""/228, 0x41100, 0x60, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000440)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000740)=[{0x0, 0x3, 0xc, 0x5}, {0x0, 0x4, 0x5, 0x1}, {0x1, 0x1, 0x2, 0xa}, {0x2, 0x2, 0xe}], 0x10, 0x69}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x9, 0x0, r3, 0x7fff, '\x00', 0x0, r2, 0x4, 0x5, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 785.320274][T16278] batman_adv: batadv0: Removing interface: team0 [ 785.353058][T16278] bridge0: port 3(team0) entered blocking state [ 785.372036][T16278] bridge0: port 3(team0) entered disabled state [ 785.393495][T16278] team0: entered allmulticast mode [ 785.407091][T16278] team_slave_0: entered allmulticast mode [ 785.429152][T16278] team_slave_1: entered allmulticast mode 07:27:24 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0xfffffffa, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x48) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x7, &(0x7f0000000540)=@raw=[@alu={0x7, 0x0, 0x4, 0x5, 0x5, 0xfffffffffffffff4, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @map_val={0x18, 0x5, 0x2, 0x0, r0}], &(0x7f0000000580)='GPL\x00', 0x0, 0x59, &(0x7f0000000840)=""/89, 0x41100, 0x8da851b6c9268371, '\x00', r2, 0x0, r6, 0x8, &(0x7f00000008c0)={0x2, 0x25}, 0x8, 0x10, &(0x7f0000000900)={0x2, 0x3, 0x1f, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000940)=[r0, r0, r1, r0], &(0x7f0000000980)=[{0x1, 0x4, 0x8, 0x8}, {0x3, 0x5, 0x4, 0x7}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 785.482708][T16278] bridge0: port 3(team0) entered blocking state [ 785.489286][T16278] bridge0: port 3(team0) entered forwarding state 07:27:24 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 785.547783][T16286] batman_adv: batadv0: Adding interface: team0 [ 785.567275][T16286] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:24 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80680000}]}, &(0x7f00000002c0)='syzkaller\x00', 0x67a8, 0x74, &(0x7f0000000300)=""/116, 0x41000, 0x5a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x7, 0x70, 0x7}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0xffffffffffffffff], &(0x7f0000000440)=[{0x1, 0x5, 0x3, 0x8}, {0x0, 0x1, 0xd, 0xb}], 0x10, 0x1}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) (async) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) (async) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x4, 0x0, 0x8, 0x1, 0x0, 0x4, 0x800, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x3, @perf_bp={&(0x7f0000000000), 0x5}, 0x2c29, 0x100, 0x7, 0x8, 0x10001, 0xff, 0x9, 0x0, 0x4, 0x0, 0x1}, r2, 0xb, r1, 0x6) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) 07:27:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:24 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0xfffffffa, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x48) (async) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0xfffffffa, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0)=r3, 0x4) (async) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x7, &(0x7f0000000540)=@raw=[@alu={0x7, 0x0, 0x4, 0x5, 0x5, 0xfffffffffffffff4, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @map_val={0x18, 0x5, 0x2, 0x0, r0}], &(0x7f0000000580)='GPL\x00', 0x0, 0x59, &(0x7f0000000840)=""/89, 0x41100, 0x8da851b6c9268371, '\x00', r2, 0x0, r6, 0x8, &(0x7f00000008c0)={0x2, 0x25}, 0x8, 0x10, &(0x7f0000000900)={0x2, 0x3, 0x1f, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000940)=[r0, r0, r1, r0], &(0x7f0000000980)=[{0x1, 0x4, 0x8, 0x8}, {0x3, 0x5, 0x4, 0x7}], 0x10, 0x2}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 785.630977][T16286] batman_adv: batadv0: Interface activated: team0 [ 785.666236][T16290] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. [ 785.684506][T16290] batman_adv: batadv0: Interface deactivated: team0 [ 785.703346][T16290] batman_adv: batadv0: Removing interface: team0 07:27:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:24 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0213a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 785.816167][T16305] team0: left allmulticast mode [ 785.893524][T16305] team_slave_0: left allmulticast mode 07:27:25 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0xfffffffa, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x48) (async, rerun: 64) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0)=r3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x7, &(0x7f0000000540)=@raw=[@alu={0x7, 0x0, 0x4, 0x5, 0x5, 0xfffffffffffffff4, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @map_val={0x18, 0x5, 0x2, 0x0, r0}], &(0x7f0000000580)='GPL\x00', 0x0, 0x59, &(0x7f0000000840)=""/89, 0x41100, 0x8da851b6c9268371, '\x00', r2, 0x0, r6, 0x8, &(0x7f00000008c0)={0x2, 0x25}, 0x8, 0x10, &(0x7f0000000900)={0x2, 0x3, 0x1f, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000940)=[r0, r0, r1, r0], &(0x7f0000000980)=[{0x1, 0x4, 0x8, 0x8}, {0x3, 0x5, 0x4, 0x7}], 0x10, 0x2}, 0x90) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 785.985806][T16305] team_slave_1: left allmulticast mode [ 786.009512][T16305] bridge0: port 3(team0) entered disabled state [ 786.102380][T16305] batman_adv: batadv0: Adding interface: team0 [ 786.129126][T16305] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 786.164481][T16305] batman_adv: batadv0: Interface activated: team0 [ 786.235843][T16312] validate_nla: 25 callbacks suppressed [ 786.235871][T16312] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 786.275858][T16312] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 786.299509][T16312] batman_adv: batadv0: Interface deactivated: team0 [ 786.316231][T16312] batman_adv: batadv0: Removing interface: team0 [ 786.336940][T16312] bridge0: port 3(team0) entered blocking state [ 786.373033][T16312] bridge0: port 3(team0) entered disabled state [ 786.392463][T16312] team0: entered allmulticast mode [ 786.410197][T16312] team_slave_0: entered allmulticast mode [ 786.423965][T16312] team_slave_1: entered allmulticast mode [ 786.456494][T16312] bridge0: port 3(team0) entered blocking state [ 786.463059][T16312] bridge0: port 3(team0) entered forwarding state 07:27:25 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x8}, 0x18) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000010c0)=0xffffffffffffffff, 0x4) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001180)=@o_path={&(0x7f0000001140)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001240)={0x6, 0x18, &(0x7f0000000f40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5e258af9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @generic={0x80, 0x6, 0x4, 0x3, 0x100}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001000)='GPL\x00', 0x81, 0x49, &(0x7f0000001040)=""/73, 0x40f00, 0x48, '\x00', 0x0, 0x25, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001100)={0x1, 0x8, 0xa2, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[r6], &(0x7f0000001200)=[{0x5, 0x4, 0xa, 0x4}], 0x10, 0x1}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r4, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d00)='freezer.self_freezing\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r11 = gettid() ioctl$TUNSETFILTEREBPF(r9, 0x800454e1, &(0x7f0000001300)=r9) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x8, 0xeb, 0x81, 0x0, 0x0, 0x59, 0x2000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x10010, 0x9, 0x2, 0x8, 0xffff, 0x10000, 0x8000, 0x0, 0x2, 0x0, 0x8}, r11, 0x1, r10, 0x9) sendmsg$kcm(r10, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x4, 0x24, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3}, [@exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @generic={0x64, 0x3, 0x6, 0x1ff, 0xfffffe01}, @generic={0x0, 0x5, 0x6, 0x9, 0x5}, @map_idx={0x18, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}]}, &(0x7f0000000c80)='GPL\x00', 0x80, 0x3c, &(0x7f0000000cc0)=""/60, 0x40f00, 0x0, '\x00', r7, 0x2b, r9, 0x8, &(0x7f0000000d40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000d80)={0x2, 0x1, 0x2, 0x1ff}, 0x10, r8, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[r3, r10, r0], &(0x7f0000000e00)=[{0x4, 0x3, 0x9, 0x8}, {0x1, 0x5, 0xb, 0x7}, {0x5, 0x1, 0xd, 0x4}, {0x4, 0x5, 0xb, 0x3}], 0x10, 0x7fff}, 0x90) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000880)=0xffffffffffffffff, 0x4) openat$cgroup_ro(r9, &(0x7f0000000f00)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x7fffffff}, @jmp={0x5, 0x0, 0x4, 0x6, 0x5, 0xffffffffffffff40}, @initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000100)='GPL\x00', 0x10001, 0xe9, &(0x7f0000000140)=""/233, 0x40f00, 0x5, '\x00', r7, 0x19, r12, 0x8, &(0x7f00000008c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xe, 0x8a5e, 0x3}, 0x10, 0x32d2, r4, 0x6, &(0x7f0000000940)=[r3, r2], &(0x7f0000000980)=[{0x2, 0x1, 0x1, 0x7}, {0x0, 0x4, 0xc, 0x9}, {0x1, 0x1, 0x2, 0x3}, {0x3, 0x2, 0xf, 0x7}, {0x4, 0x4, 0xe, 0xc}, {0x0, 0x4, 0x0, 0x6}], 0x10, 0x9}, 0x90) [ 786.527658][T16315] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 786.567590][T16317] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 07:27:25 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:25 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0313a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 786.599765][T16317] batman_adv: batadv0: Adding interface: team0 [ 786.620262][T16317] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 786.691375][T16317] batman_adv: batadv0: Interface activated: team0 [ 786.707065][T16323] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 786.725697][T16323] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. 07:27:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:25 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x8}, 0x18) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000010c0)=0xffffffffffffffff, 0x4) (async) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000010c0)=0xffffffffffffffff, 0x4) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001180)=@o_path={&(0x7f0000001140)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001240)={0x6, 0x18, &(0x7f0000000f40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5e258af9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @generic={0x80, 0x6, 0x4, 0x3, 0x100}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001000)='GPL\x00', 0x81, 0x49, &(0x7f0000001040)=""/73, 0x40f00, 0x48, '\x00', 0x0, 0x25, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001100)={0x1, 0x8, 0xa2, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[r6], &(0x7f0000001200)=[{0x5, 0x4, 0xa, 0x4}], 0x10, 0x1}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r4, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r4, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d00)='freezer.self_freezing\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r11 = gettid() ioctl$TUNSETFILTEREBPF(r9, 0x800454e1, &(0x7f0000001300)=r9) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x8, 0xeb, 0x81, 0x0, 0x0, 0x59, 0x2000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x10010, 0x9, 0x2, 0x8, 0xffff, 0x10000, 0x8000, 0x0, 0x2, 0x0, 0x8}, r11, 0x1, r10, 0x9) sendmsg$kcm(r10, 0x0, 0x0) (async) sendmsg$kcm(r10, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x4, 0x24, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3}, [@exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @generic={0x64, 0x3, 0x6, 0x1ff, 0xfffffe01}, @generic={0x0, 0x5, 0x6, 0x9, 0x5}, @map_idx={0x18, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}]}, &(0x7f0000000c80)='GPL\x00', 0x80, 0x3c, &(0x7f0000000cc0)=""/60, 0x40f00, 0x0, '\x00', r7, 0x2b, r9, 0x8, &(0x7f0000000d40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000d80)={0x2, 0x1, 0x2, 0x1ff}, 0x10, r8, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[r3, r10, r0], &(0x7f0000000e00)=[{0x4, 0x3, 0x9, 0x8}, {0x1, 0x5, 0xb, 0x7}, {0x5, 0x1, 0xd, 0x4}, {0x4, 0x5, 0xb, 0x3}], 0x10, 0x7fff}, 0x90) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000880)=0xffffffffffffffff, 0x4) openat$cgroup_ro(r9, &(0x7f0000000f00)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) openat$cgroup_ro(r9, &(0x7f0000000f00)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x7fffffff}, @jmp={0x5, 0x0, 0x4, 0x6, 0x5, 0xffffffffffffff40}, @initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000100)='GPL\x00', 0x10001, 0xe9, &(0x7f0000000140)=""/233, 0x40f00, 0x5, '\x00', r7, 0x19, r12, 0x8, &(0x7f00000008c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xe, 0x8a5e, 0x3}, 0x10, 0x32d2, r4, 0x6, &(0x7f0000000940)=[r3, r2], &(0x7f0000000980)=[{0x2, 0x1, 0x1, 0x7}, {0x0, 0x4, 0xc, 0x9}, {0x1, 0x1, 0x2, 0x3}, {0x3, 0x2, 0xf, 0x7}, {0x4, 0x4, 0xe, 0xc}, {0x0, 0x4, 0x0, 0x6}], 0x10, 0x9}, 0x90) [ 786.783705][T16323] batman_adv: batadv0: Interface deactivated: team0 [ 786.823895][T16323] batman_adv: batadv0: Removing interface: team0 [ 786.837418][T16328] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 786.860687][T16331] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 07:27:26 executing program 0: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:26 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0513a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 786.882643][T16331] team0: left allmulticast mode [ 786.889119][T16331] team_slave_0: left allmulticast mode [ 786.898283][T16331] team_slave_1: left allmulticast mode [ 786.907878][T16331] bridge0: port 3(team0) entered disabled state 07:27:26 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x8}, 0x18) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000010c0)=0xffffffffffffffff, 0x4) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001180)=@o_path={&(0x7f0000001140)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001240)={0x6, 0x18, &(0x7f0000000f40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5e258af9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @generic={0x80, 0x6, 0x4, 0x3, 0x100}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001000)='GPL\x00', 0x81, 0x49, &(0x7f0000001040)=""/73, 0x40f00, 0x48, '\x00', 0x0, 0x25, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001100)={0x1, 0x8, 0xa2, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[r6], &(0x7f0000001200)=[{0x5, 0x4, 0xa, 0x4}], 0x10, 0x1}, 0x90) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r4, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) (async) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d00)='freezer.self_freezing\x00', 0x0, 0x0) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) (async) r11 = gettid() ioctl$TUNSETFILTEREBPF(r9, 0x800454e1, &(0x7f0000001300)=r9) (async, rerun: 64) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x8, 0xeb, 0x81, 0x0, 0x0, 0x59, 0x2000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x10010, 0x9, 0x2, 0x8, 0xffff, 0x10000, 0x8000, 0x0, 0x2, 0x0, 0x8}, r11, 0x1, r10, 0x9) (rerun: 64) sendmsg$kcm(r10, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x4, 0x24, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3}, [@exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @generic={0x64, 0x3, 0x6, 0x1ff, 0xfffffe01}, @generic={0x0, 0x5, 0x6, 0x9, 0x5}, @map_idx={0x18, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}]}, &(0x7f0000000c80)='GPL\x00', 0x80, 0x3c, &(0x7f0000000cc0)=""/60, 0x40f00, 0x0, '\x00', r7, 0x2b, r9, 0x8, &(0x7f0000000d40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000d80)={0x2, 0x1, 0x2, 0x1ff}, 0x10, r8, 0xffffffffffffffff, 0x4, &(0x7f0000000dc0)=[r3, r10, r0], &(0x7f0000000e00)=[{0x4, 0x3, 0x9, 0x8}, {0x1, 0x5, 0xb, 0x7}, {0x5, 0x1, 0xd, 0x4}, {0x4, 0x5, 0xb, 0x3}], 0x10, 0x7fff}, 0x90) (async) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000880)=0xffffffffffffffff, 0x4) openat$cgroup_ro(r9, &(0x7f0000000f00)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async, rerun: 32) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x7fffffff}, @jmp={0x5, 0x0, 0x4, 0x6, 0x5, 0xffffffffffffff40}, @initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000100)='GPL\x00', 0x10001, 0xe9, &(0x7f0000000140)=""/233, 0x40f00, 0x5, '\x00', r7, 0x19, r12, 0x8, &(0x7f00000008c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xe, 0x8a5e, 0x3}, 0x10, 0x32d2, r4, 0x6, &(0x7f0000000940)=[r3, r2], &(0x7f0000000980)=[{0x2, 0x1, 0x1, 0x7}, {0x0, 0x4, 0xc, 0x9}, {0x1, 0x1, 0x2, 0x3}, {0x3, 0x2, 0xf, 0x7}, {0x4, 0x4, 0xe, 0xc}, {0x0, 0x4, 0x0, 0x6}], 0x10, 0x9}, 0x90) (rerun: 32) [ 786.953922][T16331] batman_adv: batadv0: Adding interface: team0 [ 786.961799][T16331] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 787.021620][T16331] batman_adv: batadv0: Interface activated: team0 [ 787.048026][T16334] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 787.072897][T16334] team0: left allmulticast mode 07:27:26 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 787.110486][T16334] team_slave_0: left allmulticast mode [ 787.129114][T16334] team_slave_1: left allmulticast mode [ 787.153273][T16334] bridge0: port 3(team0) entered disabled state 07:27:26 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x0, 0x80, 0x3, 0x269, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r0}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r3, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x10, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40001) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x2, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r8, 0x4) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000ac0)=@generic={&(0x7f0000000a80)='./file0\x00', 0x0, 0x4}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000b80)={{r2, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000b40)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0xd, 0x1c, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3ff}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}}, @call={0x85, 0x0, 0x0, 0x43}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0xca, &(0x7f0000000740)=""/202, 0x41100, 0x0, '\x00', r6, 0xa, r7, 0x8, &(0x7f0000000a40)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r8, r9, 0x6, &(0x7f0000000bc0)=[r1, r1, r1, r2, r1, r0, r1, r10], &(0x7f0000000c00)=[{0x2, 0x3}, {0x3, 0x4, 0x4, 0x5}, {0x3, 0x3, 0xb, 0x1}, {0x1, 0x2, 0x1, 0xb}, {0x1, 0x7, 0x5}, {0x2, 0x2, 0x5, 0x1}], 0x10, 0x877}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f0000000d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x25, 0x25, 0x5, [@fwd={0xc}, @datasec={0x6, 0x1, 0x0, 0xf, 0x1, [{0x5, 0x8000, 0x8}], "fd"}]}, {0x0, [0x0, 0x2e, 0x5f]}}, &(0x7f0000000dc0)=""/93, 0x45, 0x5d, 0x0, 0x200}, 0x20) [ 787.219629][T16334] batman_adv: batadv0: Adding interface: team0 [ 787.238364][T16334] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 787.297802][T16334] batman_adv: batadv0: Interface activated: team0 [ 787.325957][T16335] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 07:27:26 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async, rerun: 64) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x0, 0x80, 0x3, 0x269, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) (async) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r0}, 0x18) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r3, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x10, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40001) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x2, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r8, 0x4) (async) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000ac0)=@generic={&(0x7f0000000a80)='./file0\x00', 0x0, 0x4}, 0x18) (async, rerun: 64) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000b80)={{r2, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000b40)='%-010d \x00'}, 0x20) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0xd, 0x1c, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3ff}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}}, @call={0x85, 0x0, 0x0, 0x43}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0xca, &(0x7f0000000740)=""/202, 0x41100, 0x0, '\x00', r6, 0xa, r7, 0x8, &(0x7f0000000a40)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r8, r9, 0x6, &(0x7f0000000bc0)=[r1, r1, r1, r2, r1, r0, r1, r10], &(0x7f0000000c00)=[{0x2, 0x3}, {0x3, 0x4, 0x4, 0x5}, {0x3, 0x3, 0xb, 0x1}, {0x1, 0x2, 0x1, 0xb}, {0x1, 0x7, 0x5}, {0x2, 0x2, 0x5, 0x1}], 0x10, 0x877}, 0x90) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f0000000d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x25, 0x25, 0x5, [@fwd={0xc}, @datasec={0x6, 0x1, 0x0, 0xf, 0x1, [{0x5, 0x8000, 0x8}], "fd"}]}, {0x0, [0x0, 0x2e, 0x5f]}}, &(0x7f0000000dc0)=""/93, 0x45, 0x5d, 0x0, 0x200}, 0x20) [ 787.344391][T16335] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 787.368686][T16335] batman_adv: batadv0: Interface deactivated: team0 [ 787.386628][T16335] batman_adv: batadv0: Removing interface: team0 07:27:26 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x0, 0x80, 0x3, 0x269, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x0, 0x80, 0x3, 0x269, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r0}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r3, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x10, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40001) (async) write$cgroup_type(r7, &(0x7f0000000180), 0x40001) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x2}, 0x8) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x2, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r8, 0x4) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000ac0)=@generic={&(0x7f0000000a80)='./file0\x00', 0x0, 0x4}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000b80)={{r2, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000b40)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0xd, 0x1c, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3ff}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}}, @call={0x85, 0x0, 0x0, 0x43}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0xca, &(0x7f0000000740)=""/202, 0x41100, 0x0, '\x00', r6, 0xa, r7, 0x8, &(0x7f0000000a40)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, r8, r9, 0x6, &(0x7f0000000bc0)=[r1, r1, r1, r2, r1, r0, r1, r10], &(0x7f0000000c00)=[{0x2, 0x3}, {0x3, 0x4, 0x4, 0x5}, {0x3, 0x3, 0xb, 0x1}, {0x1, 0x2, 0x1, 0xb}, {0x1, 0x7, 0x5}, {0x2, 0x2, 0x5, 0x1}], 0x10, 0x877}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f0000000d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x25, 0x25, 0x5, [@fwd={0xc}, @datasec={0x6, 0x1, 0x0, 0xf, 0x1, [{0x5, 0x8000, 0x8}], "fd"}]}, {0x0, [0x0, 0x2e, 0x5f]}}, &(0x7f0000000dc0)=""/93, 0x45, 0x5d, 0x0, 0x200}, 0x20) [ 787.397243][T16335] bridge0: port 3(team0) entered blocking state [ 787.404168][T16335] bridge0: port 3(team0) entered disabled state [ 787.413208][T16335] team0: entered allmulticast mode [ 787.420199][T16335] team_slave_0: entered allmulticast mode [ 787.427731][T16335] team_slave_1: entered allmulticast mode [ 787.439476][T16335] bridge0: port 3(team0) entered blocking state 07:27:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 787.446056][T16335] bridge0: port 3(team0) entered forwarding state [ 787.455449][T16338] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 787.464752][T16338] batman_adv: batadv0: Interface deactivated: team0 [ 787.472915][T16338] batman_adv: batadv0: Removing interface: team0 [ 787.482576][T16338] bridge0: port 3(team0) entered blocking state [ 787.492094][T16338] bridge0: port 3(team0) entered disabled state [ 787.505059][T16338] team0: entered allmulticast mode [ 787.510812][T16338] team_slave_0: entered allmulticast mode [ 787.520053][T16338] team_slave_1: entered allmulticast mode [ 787.531583][T16338] bridge0: port 3(team0) entered blocking state [ 787.538194][T16338] bridge0: port 3(team0) entered forwarding state [ 787.546233][T16342] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 07:27:26 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80680000}]}, &(0x7f00000002c0)='syzkaller\x00', 0x67a8, 0x74, &(0x7f0000000300)=""/116, 0x41000, 0x5a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x7, 0x70, 0x7}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0xffffffffffffffff], &(0x7f0000000440)=[{0x1, 0x5, 0x3, 0x8}, {0x0, 0x1, 0xd, 0xb}], 0x10, 0x1}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x4, 0x0, 0x8, 0x1, 0x0, 0x4, 0x800, 0x12, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x3, @perf_bp={&(0x7f0000000000), 0x5}, 0x2c29, 0x100, 0x7, 0x8, 0x10001, 0xff, 0x9, 0x0, 0x4, 0x0, 0x1}, r2, 0xb, r1, 0x6) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) 07:27:26 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000cc0)={@map=0x1, 0x9, 0x0, 0x7, &(0x7f0000000b80)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0]}, 0x40) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x6}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x7}}]}, {0x0, [0x61, 0x2e, 0x5f, 0x5f, 0x2e, 0x30, 0x2e, 0x61]}}, &(0x7f0000000740)=""/247, 0x52, 0xf7, 0x1, 0x1ff}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{r4, 0xffffffffffffffff}, &(0x7f0000000980), &(0x7f00000009c0)=r4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0xd, &(0x7f0000000200)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r1}, @jmp={0x5, 0x0, 0x5, 0xa, 0x7, 0x30, 0xfffffffffffffff0}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x6}], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x61, '\x00', r3, 0x0, r5, 0x8, &(0x7f0000000440)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0x1, 0xb26, 0x342f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000a40)=[r6, r4, r4], &(0x7f0000000a80)=[{0x3, 0x5, 0x10, 0x1}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x11, 0x19, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000ff01000000000000f2cbffff18110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70800006d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000a54a7b1e75ab4e60063c", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000851000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000cf00000085000000860000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x87c, 0xa1, &(0x7f0000000680)=""/161, 0x41100, 0x60, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000c40)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1, 0x1, 0xffffffff, 0x0, 0x1, 0x9, '\x00', r3, r4, 0x4, 0x2, 0x5, 0xf}, 0x48) 07:27:26 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:26 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0613a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 787.612524][T16363] team0: left allmulticast mode 07:27:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000001140)={&(0x7f0000001300)=@in6={0xa, 0x0, 0x0, @mcast2, 0x31}, 0x80, 0x0}, 0x0) [ 787.648433][T16363] team_slave_0: left allmulticast mode [ 787.654202][T16363] team_slave_1: left allmulticast mode [ 787.692096][T16363] bridge0: port 3(team0) entered disabled state [ 787.870537][T16363] batman_adv: batadv0: Adding interface: team0 [ 787.915821][T16363] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x73) (async) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000001140)={&(0x7f0000001300)=@in6={0xa, 0x0, 0x0, @mcast2, 0x31}, 0x80, 0x0}, 0x0) [ 787.993194][T16363] batman_adv: batadv0: Interface activated: team0 07:27:27 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0713a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 788.053606][T16370] batman_adv: batadv0: Interface deactivated: team0 [ 788.069002][T16370] batman_adv: batadv0: Removing interface: team0 07:27:27 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000cc0)={@map=0x1, 0x9, 0x0, 0x7, &(0x7f0000000b80)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0]}, 0x40) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x6}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x7}}]}, {0x0, [0x61, 0x2e, 0x5f, 0x5f, 0x2e, 0x30, 0x2e, 0x61]}}, &(0x7f0000000740)=""/247, 0x52, 0xf7, 0x1, 0x1ff}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{r4, 0xffffffffffffffff}, &(0x7f0000000980), &(0x7f00000009c0)=r4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0xd, &(0x7f0000000200)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r1}, @jmp={0x5, 0x0, 0x5, 0xa, 0x7, 0x30, 0xfffffffffffffff0}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x6}], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x61, '\x00', r3, 0x0, r5, 0x8, &(0x7f0000000440)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0x1, 0xb26, 0x342f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000a40)=[r6, r4, r4], &(0x7f0000000a80)=[{0x3, 0x5, 0x10, 0x1}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x11, 0x19, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000ff01000000000000f2cbffff18110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70800006d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000a54a7b1e75ab4e60063c", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000851000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000cf00000085000000860000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x87c, 0xa1, &(0x7f0000000680)=""/161, 0x41100, 0x60, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000c40)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1, 0x1, 0xffffffff, 0x0, 0x1, 0x9, '\x00', r3, r4, 0x4, 0x2, 0x5, 0xf}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x58, &(0x7f0000000100)}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000cc0)={@map=0x1, 0x9, 0x0, 0x7, &(0x7f0000000b80)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x6}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x7}}]}, {0x0, [0x61, 0x2e, 0x5f, 0x5f, 0x2e, 0x30, 0x2e, 0x61]}}, &(0x7f0000000740)=""/247, 0x52, 0xf7, 0x1, 0x1ff}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{r4}, &(0x7f0000000980), &(0x7f00000009c0)=r4}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0xd, &(0x7f0000000200)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r1}, @jmp={0x5, 0x0, 0x5, 0xa, 0x7, 0x30, 0xfffffffffffffff0}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x6}], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x61, '\x00', r3, 0x0, r5, 0x8, &(0x7f0000000440)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0x1, 0xb26, 0x342f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000a40)=[r6, r4, r4], &(0x7f0000000a80)=[{0x3, 0x5, 0x10, 0x1}]}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x11, 0x19, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000ff01000000000000f2cbffff18110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70800006d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000a54a7b1e75ab4e60063c", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000851000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000cf00000085000000860000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x87c, 0xa1, &(0x7f0000000680)=""/161, 0x41100, 0x60, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000c40)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1, 0x1, 0xffffffff, 0x0, 0x1, 0x9, '\x00', r3, r4, 0x4, 0x2, 0x5, 0xf}, 0x48) (async) [ 788.101017][T16370] bridge0: port 3(team0) entered blocking state [ 788.121622][T16370] bridge0: port 3(team0) entered disabled state [ 788.148889][T16370] team0: entered allmulticast mode [ 788.170457][T16370] team_slave_0: entered allmulticast mode [ 788.193184][T16370] team_slave_1: entered allmulticast mode [ 788.212583][T16370] bridge0: port 3(team0) entered blocking state [ 788.219254][T16370] bridge0: port 3(team0) entered forwarding state 07:27:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000001140)={&(0x7f0000001300)=@in6={0xa, 0x0, 0x0, @mcast2, 0x31}, 0x80, 0x0}, 0x0) 07:27:27 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:27 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0813a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000002c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000100)="b9ff0b076859268cb89e14f088a847e0ffff200000000001001bac14142ce0", 0x0, 0x10, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 07:27:27 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0913a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:27 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000cc0)={@map=0x1, 0x9, 0x0, 0x7, &(0x7f0000000b80)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0]}, 0x40) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x6}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x7}}]}, {0x0, [0x61, 0x2e, 0x5f, 0x5f, 0x2e, 0x30, 0x2e, 0x61]}}, &(0x7f0000000740)=""/247, 0x52, 0xf7, 0x1, 0x1ff}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{r4, 0xffffffffffffffff}, &(0x7f0000000980), &(0x7f00000009c0)=r4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0xd, &(0x7f0000000200)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r1}, @jmp={0x5, 0x0, 0x5, 0xa, 0x7, 0x30, 0xfffffffffffffff0}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x6}], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x61, '\x00', r3, 0x0, r5, 0x8, &(0x7f0000000440)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0x1, 0xb26, 0x342f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000a40)=[r6, r4, r4], &(0x7f0000000a80)=[{0x3, 0x5, 0x10, 0x1}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x11, 0x19, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000ff01000000000000f2cbffff18110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70800006d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000a54a7b1e75ab4e60063c", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000851000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000cf00000085000000860000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x87c, 0xa1, &(0x7f0000000680)=""/161, 0x41100, 0x60, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000c40)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1, 0x1, 0xffffffff, 0x0, 0x1, 0x9, '\x00', r3, r4, 0x4, 0x2, 0x5, 0xf}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x58, &(0x7f0000000100)}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000cc0)={@map=0x1, 0x9, 0x0, 0x7, &(0x7f0000000b80)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x6}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x7}}]}, {0x0, [0x61, 0x2e, 0x5f, 0x5f, 0x2e, 0x30, 0x2e, 0x61]}}, &(0x7f0000000740)=""/247, 0x52, 0xf7, 0x1, 0x1ff}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{r4}, &(0x7f0000000980), &(0x7f00000009c0)=r4}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0xd, &(0x7f0000000200)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r1}, @jmp={0x5, 0x0, 0x5, 0xa, 0x7, 0x30, 0xfffffffffffffff0}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x6}], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x61, '\x00', r3, 0x0, r5, 0x8, &(0x7f0000000440)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0x1, 0xb26, 0x342f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000a40)=[r6, r4, r4], &(0x7f0000000a80)=[{0x3, 0x5, 0x10, 0x1}]}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x11, 0x19, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000ff01000000000000f2cbffff18110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70800006d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000a54a7b1e75ab4e60063c", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000851000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000cf00000085000000860000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x87c, 0xa1, &(0x7f0000000680)=""/161, 0x41100, 0x60, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000c40)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1, 0x1, 0xffffffff, 0x0, 0x1, 0x9, '\x00', r3, r4, 0x4, 0x2, 0x5, 0xf}, 0x48) (async) [ 788.643538][T16396] team0: left allmulticast mode [ 788.655289][T16396] team_slave_0: left allmulticast mode [ 788.699491][T16396] team_slave_1: left allmulticast mode [ 788.721203][T16396] bridge0: port 3(team0) entered disabled state [ 788.798105][T16396] batman_adv: batadv0: Adding interface: team0 07:27:27 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r0, 0x9, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x3) recvmsg$unix(r0, &(0x7f0000000a00)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000580)=""/182, 0xb6}, {&(0x7f0000000640)=""/68, 0x44}, {0x0}, {&(0x7f00000001c0)}, {&(0x7f0000000780)=""/83, 0x53}], 0x5, &(0x7f0000000b80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x96d04}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_pressure(r4, &(0x7f00000001c0)='cpu.pressure\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000280)='memory.events.local\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) close(0xffffffffffffffff) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x4010040c000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="4972ecffffffff0000000072"], 0x3a) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x20000, 0x23000) r6 = perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x8f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x6, 0x3f, 0x7, 0x2, 0x0, 0x80, 0x240, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0x5}, 0x408, 0x2, 0x5, 0x6, 0x8000, 0x5, 0x0, 0x0, 0x8, 0x0, 0x5}, 0x0, 0xf, r6, 0xa) 07:27:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000002c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000100)="b9ff0b076859268cb89e14f088a847e0ffff200000000001001bac14142ce0", 0x0, 0x10, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) close(r0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000002c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000100)="b9ff0b076859268cb89e14f088a847e0ffff200000000001001bac14142ce0", 0x0, 0x10, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) [ 788.824842][T16396] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000002c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000100)="b9ff0b076859268cb89e14f088a847e0ffff200000000001001bac14142ce0", 0x0, 0x10, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) [ 788.890382][T16396] batman_adv: batadv0: Interface activated: team0 07:27:28 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000100)=@pptp={0x18, 0x2, {0x2, @private=0xa010101}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000000)="2eb722b6cba071c54c487a1677ad3cd9da192dc399b34c238cf6a4972f78f61f58c5807513f00caf4353c45b8e9fa9bb6846", 0x32}], 0x1}, 0x24044000) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r3 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xd3, 0x6, 0x5, 0x3, 0x0, 0x4, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x6, 0x7fffffffffffffff}, 0x4180, 0x3, 0x400, 0x5, 0x80000000, 0x8d, 0x8165, 0x0, 0x1, 0x0, 0x12}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xff, 0xff, 0x7, 0x2, 0x0, 0x92, 0xc, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x800, 0x2, @perf_config_ext={0x2}, 0x90200, 0x8, 0x20, 0x2, 0xfffd, 0x40, 0x5, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x7, r3, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 788.933876][T16401] __nla_validate_parse: 2 callbacks suppressed [ 788.933901][T16401] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 788.952777][T16401] batman_adv: batadv0: Interface deactivated: team0 07:27:28 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0a13a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 788.980911][T16401] batman_adv: batadv0: Removing interface: team0 [ 788.992350][T16401] bridge0: port 3(team0) entered blocking state [ 789.007447][T16401] bridge0: port 3(team0) entered disabled state [ 789.015833][T16401] team0: entered allmulticast mode [ 789.045954][T16401] team_slave_0: entered allmulticast mode [ 789.051925][T16401] team_slave_1: entered allmulticast mode [ 789.067481][T16401] bridge0: port 3(team0) entered blocking state [ 789.074081][T16401] bridge0: port 3(team0) entered forwarding state 07:27:28 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000100)=@pptp={0x18, 0x2, {0x2, @private=0xa010101}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000000)="2eb722b6cba071c54c487a1677ad3cd9da192dc399b34c238cf6a4972f78f61f58c5807513f00caf4353c45b8e9fa9bb6846", 0x32}], 0x1}, 0x24044000) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async, rerun: 32) r3 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xd3, 0x6, 0x5, 0x3, 0x0, 0x4, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x6, 0x7fffffffffffffff}, 0x4180, 0x3, 0x400, 0x5, 0x80000000, 0x8d, 0x8165, 0x0, 0x1, 0x0, 0x12}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xff, 0xff, 0x7, 0x2, 0x0, 0x92, 0xc, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x800, 0x2, @perf_config_ext={0x2}, 0x90200, 0x8, 0x20, 0x2, 0xfffd, 0x40, 0x5, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x7, r3, 0x1) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (rerun: 32) 07:27:28 executing program 4: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_migrate\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0xfffffffffffffffa, 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001700)={0x6, 0x10, &(0x7f0000000580)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@kfunc]}, &(0x7f0000000640)='GPL\x00', 0x3}, 0x90) 07:27:28 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:28 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc1013a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:28 executing program 4: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_migrate\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0xfffffffffffffffa, 0x12) (async) write$cgroup_int(r0, &(0x7f0000000040)=0xfffffffffffffffa, 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001700)={0x6, 0x10, &(0x7f0000000580)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@kfunc]}, &(0x7f0000000640)='GPL\x00', 0x3}, 0x90) 07:27:28 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r0, 0x9, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x3) recvmsg$unix(r0, &(0x7f0000000a00)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000580)=""/182, 0xb6}, {&(0x7f0000000640)=""/68, 0x44}, {0x0}, {&(0x7f00000001c0)}, {&(0x7f0000000780)=""/83, 0x53}], 0x5, &(0x7f0000000b80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}, 0x20) (async) recvmsg$unix(r0, &(0x7f0000000a00)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000580)=""/182, 0xb6}, {&(0x7f0000000640)=""/68, 0x44}, {0x0}, {&(0x7f00000001c0)}, {&(0x7f0000000780)=""/83, 0x53}], 0x5, &(0x7f0000000b80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) (async) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x96d04}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_pressure(r4, &(0x7f00000001c0)='cpu.pressure\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000280)='memory.events.local\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) (async) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) close(0xffffffffffffffff) (async) close(0xffffffffffffffff) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x4010040c000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="4972ecffffffff0000000072"], 0x3a) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x20000, 0x23000) r6 = perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x8f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x6, 0x3f, 0x7, 0x2, 0x0, 0x80, 0x240, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0x5}, 0x408, 0x2, 0x5, 0x6, 0x8000, 0x5, 0x0, 0x0, 0x8, 0x0, 0x5}, 0x0, 0xf, r6, 0xa) (async) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x6, 0x3f, 0x7, 0x2, 0x0, 0x80, 0x240, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0x5}, 0x408, 0x2, 0x5, 0x6, 0x8000, 0x5, 0x0, 0x0, 0x8, 0x0, 0x5}, 0x0, 0xf, r6, 0xa) 07:27:28 executing program 4: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_migrate\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0xfffffffffffffffa, 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001700)={0x6, 0x10, &(0x7f0000000580)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@kfunc]}, &(0x7f0000000640)='GPL\x00', 0x3}, 0x90) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_migrate\x00', 0x2, 0x0) (async) write$cgroup_int(r0, &(0x7f0000000040)=0xfffffffffffffffa, 0x12) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001700)={0x6, 0x10, &(0x7f0000000580)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@kfunc]}, &(0x7f0000000640)='GPL\x00', 0x3}, 0x90) (async) 07:27:28 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f843100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 789.391337][T16436] team0: left allmulticast mode [ 789.398192][T16436] team_slave_0: left allmulticast mode [ 789.414771][T16436] team_slave_1: left allmulticast mode [ 789.441874][T16436] bridge0: port 3(team0) entered disabled state 07:27:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)=""/32, 0x41000, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0x0, 0x0}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740), 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x5}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x52, 0x0, 0xc87c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0506617, &(0x7f0000000040)=0x2) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000002400)=ANY=[@ANYBLOB="9feb0100182ed024a6000000000000001c0000001c00000003000000010000000000000e0200000000000000000002000000000504000000002e1b8363bb13341fd1cf2203b4a73c7434bd7e28ac582e5dc44ca1f3df00000080a582ed624cfd9aefec3f2c29a264a053362ec3eb46220373005c3c1b7f9dcdfa6453a50c8948a539a0937dd8b4ecdf028e84db4e8dc0b7b9dab18ad69b351ff4e1bef198d6b0b97f0000da059b3fd3dc394582"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r9, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r10, 0x0, '\x00', 0x0, r8, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b40)={r7, 0xe0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000780)=[0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001980), &(0x7f00000019c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001dc0)={&(0x7f0000001b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x143, 0x143, 0x7, [@typedef={0x3}, @typedef={0x8, 0x0, 0x0, 0x8, 0x1}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x55, 0x0, 0x48, 0x3}, @struct={0xf, 0xa, 0x0, 0x4, 0x1, 0x9, [{0xc, 0x5, 0xff}, {0xc, 0x3, 0x1}, {0x49e, 0x2, 0x2}, {0xb, 0x2, 0x1}, {0xa, 0x1, 0x447d}, {0xa, 0x0, 0x10001}, {0x4, 0x4, 0x401}, {0xb, 0x3, 0x3}, {0xb, 0x0, 0x3}, {0xb, 0x4, 0x2}]}, @datasec={0xe, 0x8, 0x0, 0xf, 0x3, [{0x5, 0x401, 0x401}, {0x1, 0x3, 0x80000001}, {0x4, 0x2}, {0x4, 0x401, 0x81}, {0x5, 0x7, 0x3}, {0x2, 0x1000, 0x101}, {0x3, 0xeb, 0x20}, {0x5, 0x7b, 0x6c}], "184ef3"}, @const={0x1, 0x0, 0x0, 0xa, 0x2}, @volatile={0x2, 0x0, 0x0, 0x9, 0x5}, @var={0x7, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x30, 0x0, 0x5f, 0x30, 0x0]}}, &(0x7f0000001d00)=""/171, 0x163, 0xab, 0x0, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001f40)={0x11, 0x1a, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000ff7f000000000000000200001800000000ffffff00000000faa2000085000000ab000000180000005e0400000000000040000000b7080000000000007b8af8ff00000000b7080000010000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70500000800000085003cc9bb51bdbbf8f9a700", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000000700)='GPL\x00', 0x8, 0x1000, &(0x7f0000000980)=""/4096, 0x41100, 0x11, '\x00', r11, 0x0, r12, 0x8, &(0x7f0000001e00)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000001e40)={0x1, 0x9, 0x400, 0x3f}, 0x10, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001e80)=[{0x5, 0x3, 0x4, 0x1}, {0x5, 0x4, 0x7, 0x5}, {0x3, 0x2, 0xd, 0x2}, {0x2, 0x5, 0xf, 0x8}, {0x2, 0x5, 0xd, 0x3}, {0x2, 0x5, 0x10}, {0x0, 0x4, 0xd, 0x2}, {0x5, 0x5, 0xa, 0x1}, {0x0, 0x1, 0x10, 0x8}], 0x10, 0x40}, 0x90) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r0, 0x20, &(0x7f0000000680)={&(0x7f00000005c0)=""/4, 0x4, 0x0, &(0x7f0000000600)=""/99, 0x63}}, 0x10) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0x1f, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x0, 0x4, 0xfffffffffffffff5, 0xfffffffffffffffc}, @alu={0xe, 0x0, 0x2, 0x5, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7ff}, @generic={0x7f, 0x7, 0x2, 0x8, 0x1}, @map_val={0x18, 0x9, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1f}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x1a}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000880)='syzkaller\x00', 0xe316, 0x54, &(0x7f00000008c0)=""/84, 0x41000, 0x2b, '\x00', 0x0, 0xb, r0, 0x8, &(0x7f0000000940)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2, 0x3, &(0x7f0000000980)=[r0, r0, r0], &(0x7f00000009c0)=[{0x2, 0x2, 0xe, 0x1}, {0x4, 0x1, 0x6, 0x3}, {0x4, 0x2, 0xc, 0x7}]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x14, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0x8, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f00000002c0)='syzkaller\x00', 0x4, 0xea, &(0x7f0000000300)=""/234, 0x41000, 0x23, '\x00', r11, 0x32, r2, 0x8, &(0x7f0000000500)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x10, 0x1ff}, 0x10, r13, r14, 0x4, 0x0, &(0x7f0000000ac0)=[{0x4, 0x3, 0xa, 0xc}, {0x0, 0x4, 0x4}, {0x2, 0x4, 0x0, 0x3}, {0x4, 0x5, 0xc, 0x5}], 0x10, 0x6}, 0x90) r15 = getpid() perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x1, 0x96, 0x4, 0x80, 0x0, 0x5, 0x40000, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x3}, 0x440, 0x0, 0x1f, 0x1, 0x0, 0x4, 0x934, 0x0, 0x7fff, 0x0, 0x2b378a99}, r15, 0xb, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000022c0)={r7, 0xe0, &(0x7f00000021c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000002040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002080)=[0x0], 0x0, 0x8, &(0x7f00000020c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000002100), &(0x7f0000002140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002180)}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) [ 789.527439][T16436] batman_adv: batadv0: Adding interface: team0 07:27:28 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000100)=@pptp={0x18, 0x2, {0x2, @private=0xa010101}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000000)="2eb722b6cba071c54c487a1677ad3cd9da192dc399b34c238cf6a4972f78f61f58c5807513f00caf4353c45b8e9fa9bb6846", 0x32}], 0x1}, 0x24044000) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r3 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xd3, 0x6, 0x5, 0x3, 0x0, 0x4, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x6, 0x7fffffffffffffff}, 0x4180, 0x3, 0x400, 0x5, 0x80000000, 0x8d, 0x8165, 0x0, 0x1, 0x0, 0x12}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xff, 0xff, 0x7, 0x2, 0x0, 0x92, 0xc, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x800, 0x2, @perf_config_ext={0x2}, 0x90200, 0x8, 0x20, 0x2, 0xfffd, 0x40, 0x5, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x7, r3, 0x1) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 789.561307][T16436] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 789.610436][T16436] batman_adv: batadv0: Interface activated: team0 [ 789.623538][T16446] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 07:27:28 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d17742d51a7b795002ffeee4fcba611d100000d0000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 789.654160][T16446] batman_adv: batadv0: Interface deactivated: team0 [ 789.667947][T16446] batman_adv: batadv0: Removing interface: team0 [ 789.683316][T16446] bridge0: port 3(team0) entered blocking state [ 789.711593][T16446] bridge0: port 3(team0) entered disabled state [ 789.720247][T16446] team0: entered allmulticast mode [ 789.728291][T16446] team_slave_0: entered allmulticast mode [ 789.739972][T16446] team_slave_1: entered allmulticast mode [ 789.752571][T16446] bridge0: port 3(team0) entered blocking state 07:27:28 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r0, 0x9, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) (async) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x3) recvmsg$unix(r0, &(0x7f0000000a00)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000580)=""/182, 0xb6}, {&(0x7f0000000640)=""/68, 0x44}, {0x0}, {&(0x7f00000001c0)}, {&(0x7f0000000780)=""/83, 0x53}], 0x5, &(0x7f0000000b80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r2, &(0x7f0000000140)='FREEZING\x00', 0x9) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x96d04}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x96d04}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_pressure(r4, &(0x7f00000001c0)='cpu.pressure\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000280)='memory.events.local\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) (async) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) close(0xffffffffffffffff) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x4010040c000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="4972ecffffffff0000000072"], 0x3a) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="4972ecffffffff0000000072"], 0x3a) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x20000, 0x23000) (async) write$cgroup_int(r0, &(0x7f0000000200)=0x20000, 0x23000) r6 = perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x8f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x6, 0x3f, 0x7, 0x2, 0x0, 0x80, 0x240, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0x5}, 0x408, 0x2, 0x5, 0x6, 0x8000, 0x5, 0x0, 0x0, 0x8, 0x0, 0x5}, 0x0, 0xf, r6, 0xa) [ 789.759105][T16446] bridge0: port 3(team0) entered forwarding state 07:27:29 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xfffffffc, '\x00', 0x0, 0x0, 0x0, 0x4, 0x10000}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000180), &(0x7f00000001c0)='%-010d \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000b70800000000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="d3000000b74500000800000085000000bf5900009500000000000000bf0896bf47cdf442b27a1c3e1d13839c6bb86013c126f1c8e460596979e61e6f73a41ff1aaa2ef5b06dff6d0fd913ed58c35ee00000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0xa7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) close(r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x8, 0x3, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000017c0)={0xfffffe00, 0x0}, 0x8) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r7, &(0x7f0000000280)='THAWED\x00', 0x7) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) bpf$PROG_LOAD(0x5, &(0x7f0000001c80)={0x1e, 0xa, &(0x7f0000001a00)=@raw=[@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ldst={0x0, 0x1, 0x2, 0x4, 0x4, 0xfffffffffffffffc, 0x4}, @call={0x85, 0x0, 0x0, 0x401}], &(0x7f0000001a80)='syzkaller\x00', 0x3fe000, 0xc8, &(0x7f0000001ac0)=""/200, 0x41100, 0x2d, '\x00', r5, 0x14, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001bc0)={0x0, 0x1, 0x5, 0x40}, 0x10, r6, r3, 0x1, &(0x7f0000001c00)=[r1, r1], &(0x7f0000001c40)=[{0x4, 0x4, 0x1, 0x1}], 0x10, 0x80000000}, 0x90) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001800)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x9, 0x13, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, @exit]}, &(0x7f0000000300)='GPL\x00', 0x76, 0x1000, &(0x7f0000000740)=""/4096, 0x40f00, 0x6c, '\x00', r5, 0x32, 0xffffffffffffffff, 0x8, &(0x7f0000001780)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, r6, 0xffffffffffffffff, 0x5, &(0x7f0000001880)=[r1, r2, r4, r8, r1], &(0x7f00000018c0)=[{0x4, 0x3, 0x7, 0x7}, {0x1, 0x1, 0x3, 0x2}, {0x0, 0x2, 0x5}, {0x5, 0x4, 0x3, 0x5}, {0x4, 0x2, 0xf, 0x5}], 0x10, 0x7f}, 0x90) 07:27:29 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848020000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:29 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:29 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xfffffffc, '\x00', 0x0, 0x0, 0x0, 0x4, 0x10000}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000180), &(0x7f00000001c0)='%-010d \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000b70800000000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="d3000000b74500000800000085000000bf5900009500000000000000bf0896bf47cdf442b27a1c3e1d13839c6bb86013c126f1c8e460596979e61e6f73a41ff1aaa2ef5b06dff6d0fd913ed58c35ee00000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0xa7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) close(r4) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x8, 0x3, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000017c0)={0xfffffe00, 0x0}, 0x8) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r7, &(0x7f0000000280)='THAWED\x00', 0x7) (async) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001c80)={0x1e, 0xa, &(0x7f0000001a00)=@raw=[@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ldst={0x0, 0x1, 0x2, 0x4, 0x4, 0xfffffffffffffffc, 0x4}, @call={0x85, 0x0, 0x0, 0x401}], &(0x7f0000001a80)='syzkaller\x00', 0x3fe000, 0xc8, &(0x7f0000001ac0)=""/200, 0x41100, 0x2d, '\x00', r5, 0x14, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001bc0)={0x0, 0x1, 0x5, 0x40}, 0x10, r6, r3, 0x1, &(0x7f0000001c00)=[r1, r1], &(0x7f0000001c40)=[{0x4, 0x4, 0x1, 0x1}], 0x10, 0x80000000}, 0x90) (async) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001800)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x9, 0x13, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, @exit]}, &(0x7f0000000300)='GPL\x00', 0x76, 0x1000, &(0x7f0000000740)=""/4096, 0x40f00, 0x6c, '\x00', r5, 0x32, 0xffffffffffffffff, 0x8, &(0x7f0000001780)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, r6, 0xffffffffffffffff, 0x5, &(0x7f0000001880)=[r1, r2, r4, r8, r1], &(0x7f00000018c0)=[{0x4, 0x3, 0x7, 0x7}, {0x1, 0x1, 0x3, 0x2}, {0x0, 0x2, 0x5}, {0x5, 0x4, 0x3, 0x5}, {0x4, 0x2, 0xf, 0x5}], 0x10, 0x7f}, 0x90) 07:27:29 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848030000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 790.143574][T16470] team0: left allmulticast mode [ 790.162186][T16470] team_slave_0: left allmulticast mode [ 790.179805][T16470] team_slave_1: left allmulticast mode [ 790.197814][T16470] bridge0: port 3(team0) entered disabled state [ 790.292767][T16470] batman_adv: batadv0: Adding interface: team0 [ 790.311540][T16470] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:29 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xfffffffc, '\x00', 0x0, 0x0, 0x0, 0x4, 0x10000}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000180), &(0x7f00000001c0)='%-010d \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000b70800000000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="d3000000b74500000800000085000000bf5900009500000000000000bf0896bf47cdf442b27a1c3e1d13839c6bb86013c126f1c8e460596979e61e6f73a41ff1aaa2ef5b06dff6d0fd913ed58c35ee00000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0xa7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) close(r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x8, 0x3, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000017c0)={0xfffffe00, 0x0}, 0x8) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r7, &(0x7f0000000280)='THAWED\x00', 0x7) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) bpf$PROG_LOAD(0x5, &(0x7f0000001c80)={0x1e, 0xa, &(0x7f0000001a00)=@raw=[@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ldst={0x0, 0x1, 0x2, 0x4, 0x4, 0xfffffffffffffffc, 0x4}, @call={0x85, 0x0, 0x0, 0x401}], &(0x7f0000001a80)='syzkaller\x00', 0x3fe000, 0xc8, &(0x7f0000001ac0)=""/200, 0x41100, 0x2d, '\x00', r5, 0x14, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001bc0)={0x0, 0x1, 0x5, 0x40}, 0x10, r6, r3, 0x1, &(0x7f0000001c00)=[r1, r1], &(0x7f0000001c40)=[{0x4, 0x4, 0x1, 0x1}], 0x10, 0x80000000}, 0x90) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001800)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x9, 0x13, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, @exit]}, &(0x7f0000000300)='GPL\x00', 0x76, 0x1000, &(0x7f0000000740)=""/4096, 0x40f00, 0x6c, '\x00', r5, 0x32, 0xffffffffffffffff, 0x8, &(0x7f0000001780)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, r6, 0xffffffffffffffff, 0x5, &(0x7f0000001880)=[r1, r2, r4, r8, r1], &(0x7f00000018c0)=[{0x4, 0x3, 0x7, 0x7}, {0x1, 0x1, 0x3, 0x2}, {0x0, 0x2, 0x5}, {0x5, 0x4, 0x3, 0x5}, {0x4, 0x2, 0xf, 0x5}], 0x10, 0x7f}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1}, 0x4) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xfffffffc, '\x00', 0x0, 0x0, 0x0, 0x4, 0x10000}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000180), &(0x7f00000001c0)='%-010d \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r1}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000b70800000000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="d3000000b74500000800000085000000bf5900009500000000000000bf0896bf47cdf442b27a1c3e1d13839c6bb86013c126f1c8e460596979e61e6f73a41ff1aaa2ef5b06dff6d0fd913ed58c35ee00000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0xa7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) (async) close(r4) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x8, 0x3, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={r0, 0x58, &(0x7f0000000580)}, 0x10) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000017c0)={0xfffffe00}, 0x8) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) (async) write$cgroup_freezer_state(r7, &(0x7f0000000280)='THAWED\x00', 0x7) (async) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001c80)={0x1e, 0xa, &(0x7f0000001a00)=@raw=[@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ldst={0x0, 0x1, 0x2, 0x4, 0x4, 0xfffffffffffffffc, 0x4}, @call={0x85, 0x0, 0x0, 0x401}], &(0x7f0000001a80)='syzkaller\x00', 0x3fe000, 0xc8, &(0x7f0000001ac0)=""/200, 0x41100, 0x2d, '\x00', r5, 0x14, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001bc0)={0x0, 0x1, 0x5, 0x40}, 0x10, r6, r3, 0x1, &(0x7f0000001c00)=[r1, r1], &(0x7f0000001c40)=[{0x4, 0x4, 0x1, 0x1}], 0x10, 0x80000000}, 0x90) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001800)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x9, 0x13, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, @exit]}, &(0x7f0000000300)='GPL\x00', 0x76, 0x1000, &(0x7f0000000740)=""/4096, 0x40f00, 0x6c, '\x00', r5, 0x32, 0xffffffffffffffff, 0x8, &(0x7f0000001780)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, r6, 0xffffffffffffffff, 0x5, &(0x7f0000001880)=[r1, r2, r4, r8, r1], &(0x7f00000018c0)=[{0x4, 0x3, 0x7, 0x7}, {0x1, 0x1, 0x3, 0x2}, {0x0, 0x2, 0x5}, {0x5, 0x4, 0x3, 0x5}, {0x4, 0x2, 0xf, 0x5}], 0x10, 0x7f}, 0x90) (async) 07:27:29 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x307, 0x0, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000240), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) [ 790.418529][T16470] batman_adv: batadv0: Interface activated: team0 07:27:29 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)=""/32, 0x41000, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740), 0x4) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740), 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x5}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x52, 0x0, 0xc87c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0506617, &(0x7f0000000040)=0x2) (async) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0506617, &(0x7f0000000040)=0x2) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r7 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000002400)=ANY=[@ANYBLOB="9feb0100182ed024a6000000000000001c0000001c00000003000000010000000000000e0200000000000000000002000000000504000000002e1b8363bb13341fd1cf2203b4a73c7434bd7e28ac582e5dc44ca1f3df00000080a582ed624cfd9aefec3f2c29a264a053362ec3eb46220373005c3c1b7f9dcdfa6453a50c8948a539a0937dd8b4ecdf028e84db4e8dc0b7b9dab18ad69b351ff4e1bef198d6b0b97f0000da059b3fd3dc394582"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) (async) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000002400)=ANY=[@ANYBLOB="9feb0100182ed024a6000000000000001c0000001c00000003000000010000000000000e0200000000000000000002000000000504000000002e1b8363bb13341fd1cf2203b4a73c7434bd7e28ac582e5dc44ca1f3df00000080a582ed624cfd9aefec3f2c29a264a053362ec3eb46220373005c3c1b7f9dcdfa6453a50c8948a539a0937dd8b4ecdf028e84db4e8dc0b7b9dab18ad69b351ff4e1bef198d6b0b97f0000da059b3fd3dc394582"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r9, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r10, 0x0, '\x00', 0x0, r8, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b40)={r7, 0xe0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000780)=[0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001980), &(0x7f00000019c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001dc0)={&(0x7f0000001b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x143, 0x143, 0x7, [@typedef={0x3}, @typedef={0x8, 0x0, 0x0, 0x8, 0x1}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x55, 0x0, 0x48, 0x3}, @struct={0xf, 0xa, 0x0, 0x4, 0x1, 0x9, [{0xc, 0x5, 0xff}, {0xc, 0x3, 0x1}, {0x49e, 0x2, 0x2}, {0xb, 0x2, 0x1}, {0xa, 0x1, 0x447d}, {0xa, 0x0, 0x10001}, {0x4, 0x4, 0x401}, {0xb, 0x3, 0x3}, {0xb, 0x0, 0x3}, {0xb, 0x4, 0x2}]}, @datasec={0xe, 0x8, 0x0, 0xf, 0x3, [{0x5, 0x401, 0x401}, {0x1, 0x3, 0x80000001}, {0x4, 0x2}, {0x4, 0x401, 0x81}, {0x5, 0x7, 0x3}, {0x2, 0x1000, 0x101}, {0x3, 0xeb, 0x20}, {0x5, 0x7b, 0x6c}], "184ef3"}, @const={0x1, 0x0, 0x0, 0xa, 0x2}, @volatile={0x2, 0x0, 0x0, 0x9, 0x5}, @var={0x7, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x30, 0x0, 0x5f, 0x30, 0x0]}}, &(0x7f0000001d00)=""/171, 0x163, 0xab, 0x0, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001f40)={0x11, 0x1a, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000ff7f000000000000000200001800000000ffffff00000000faa2000085000000ab000000180000005e0400000000000040000000b7080000000000007b8af8ff00000000b7080000010000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70500000800000085003cc9bb51bdbbf8f9a700", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000000700)='GPL\x00', 0x8, 0x1000, &(0x7f0000000980)=""/4096, 0x41100, 0x11, '\x00', r11, 0x0, r12, 0x8, &(0x7f0000001e00)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000001e40)={0x1, 0x9, 0x400, 0x3f}, 0x10, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001e80)=[{0x5, 0x3, 0x4, 0x1}, {0x5, 0x4, 0x7, 0x5}, {0x3, 0x2, 0xd, 0x2}, {0x2, 0x5, 0xf, 0x8}, {0x2, 0x5, 0xd, 0x3}, {0x2, 0x5, 0x10}, {0x0, 0x4, 0xd, 0x2}, {0x5, 0x5, 0xa, 0x1}, {0x0, 0x1, 0x10, 0x8}], 0x10, 0x40}, 0x90) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r0, 0x20, &(0x7f0000000680)={&(0x7f00000005c0)=""/4, 0x4, 0x0, &(0x7f0000000600)=""/99, 0x63}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r0, 0x20, &(0x7f0000000680)={&(0x7f00000005c0)=""/4, 0x4, 0x0, &(0x7f0000000600)=""/99, 0x63}}, 0x10) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0x1f, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x0, 0x4, 0xfffffffffffffff5, 0xfffffffffffffffc}, @alu={0xe, 0x0, 0x2, 0x5, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7ff}, @generic={0x7f, 0x7, 0x2, 0x8, 0x1}, @map_val={0x18, 0x9, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1f}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x1a}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000880)='syzkaller\x00', 0xe316, 0x54, &(0x7f00000008c0)=""/84, 0x41000, 0x2b, '\x00', 0x0, 0xb, r0, 0x8, &(0x7f0000000940)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2, 0x3, &(0x7f0000000980)=[r0, r0, r0], &(0x7f00000009c0)=[{0x2, 0x2, 0xe, 0x1}, {0x4, 0x1, 0x6, 0x3}, {0x4, 0x2, 0xc, 0x7}]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x14, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0x8, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f00000002c0)='syzkaller\x00', 0x4, 0xea, &(0x7f0000000300)=""/234, 0x41000, 0x23, '\x00', r11, 0x32, r2, 0x8, &(0x7f0000000500)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x10, 0x1ff}, 0x10, r13, r14, 0x4, 0x0, &(0x7f0000000ac0)=[{0x4, 0x3, 0xa, 0xc}, {0x0, 0x4, 0x4}, {0x2, 0x4, 0x0, 0x3}, {0x4, 0x5, 0xc, 0x5}], 0x10, 0x6}, 0x90) r15 = getpid() perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x1, 0x96, 0x4, 0x80, 0x0, 0x5, 0x40000, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x3}, 0x440, 0x0, 0x1f, 0x1, 0x0, 0x4, 0x934, 0x0, 0x7fff, 0x0, 0x2b378a99}, r15, 0xb, 0xffffffffffffffff, 0xb) (async) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x1, 0x96, 0x4, 0x80, 0x0, 0x5, 0x40000, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x3}, 0x440, 0x0, 0x1f, 0x1, 0x0, 0x4, 0x934, 0x0, 0x7fff, 0x0, 0x2b378a99}, r15, 0xb, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000022c0)={r7, 0xe0, &(0x7f00000021c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000002040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002080)=[0x0], 0x0, 0x8, &(0x7f00000020c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000002100), &(0x7f0000002140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002180)}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) [ 790.477041][T16475] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 790.503420][T16475] batman_adv: batadv0: Interface deactivated: team0 07:27:29 executing program 0: r0 = socket$kcm(0x21, 0x2, 0xa) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000500), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) r3 = syz_clone(0x8000580, &(0x7f00000002c0)="3c151ab2748d6fdce1135174a851bd8fee798f6b79c516c95593b68f9f87da198e06448895400e699d6461273894d07e869efb68811561f3508a1a5790a401f52589fbe3c942d2b59b430be127a34d99cb1f43bfd726aac45c0171c54ec7934ed18fada1bf895d12e6d699fbfe4fa2841b1d815d825c3f0f55fc1f8b12922b58e5bd8237cf6affee9711b54f53030e18f17d3e425ecd41cb7eed57df47bd", 0x9e, &(0x7f0000000380), &(0x7f0000000440), &(0x7f0000000480)="c1acf3c527bcb7becec26b29fa1308294f1a68ca3b01042ef4942ac6b22f8a210e9d99838f9271e088196a6af2ab54fa9d93ab3741bba6da84d161d517d6ce8e7ed10b8bae43cea8bdc13e85") perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0xf9, 0x7, 0x40, 0x81, 0x0, 0xa44, 0x40000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x101}, 0x80002, 0x2, 0x0, 0x5, 0x7fff, 0x4, 0x2, 0x0, 0x9, 0x0, 0x8000000000000001}, r3, 0xa, r1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="18b6af4999c5988dbede0eb9d5bcbac70300070000000000100100000b000000dc770ab3e4004411b096d656f83235a470d3ecf5cafc93da44470c779067e4104dd0e27512a830e9d977be2e63dc29002000000000"], 0x18}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='xprt_ping\x00', r4}, 0x10) [ 790.525672][T16475] batman_adv: batadv0: Removing interface: team0 [ 790.565034][T16475] bridge0: port 3(team0) entered blocking state 07:27:29 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x307, 0x0, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000240), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) [ 790.617168][T16475] bridge0: port 3(team0) entered disabled state [ 790.662705][T16475] team0: entered allmulticast mode [ 790.710734][T16475] team_slave_0: entered allmulticast mode [ 790.743331][T16475] team_slave_1: entered allmulticast mode [ 790.793762][T16475] bridge0: port 3(team0) entered blocking state [ 790.800369][T16475] bridge0: port 3(team0) entered forwarding state 07:27:30 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async, rerun: 64) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x307, 0x0, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x5}, 0x48) (rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000240), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) 07:27:30 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:30 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848040000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 791.063200][T16503] batman_adv: batadv0: Adding interface: gretap0 [ 791.087472][T16503] batman_adv: batadv0: The MTU of interface gretap0 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 791.186483][T16503] batman_adv: batadv0: Interface activated: gretap0 07:27:30 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) 07:27:30 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848050000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 791.292655][T16508] validate_nla: 18 callbacks suppressed [ 791.357593][T16508] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 07:27:30 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) [ 791.413126][T16508] team0: left allmulticast mode [ 791.441745][T16508] team_slave_0: left allmulticast mode 07:27:30 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) 07:27:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040)=""/32, 0x41000, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0x0, 0x0}, 0x10) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740), 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x5}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x52, 0x0, 0xc87c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0506617, &(0x7f0000000040)=0x2) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) (async, rerun: 64) r7 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (rerun: 64) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000002400)=ANY=[@ANYBLOB="9feb0100182ed024a6000000000000001c0000001c00000003000000010000000000000e0200000000000000000002000000000504000000002e1b8363bb13341fd1cf2203b4a73c7434bd7e28ac582e5dc44ca1f3df00000080a582ed624cfd9aefec3f2c29a264a053362ec3eb46220373005c3c1b7f9dcdfa6453a50c8948a539a0937dd8b4ecdf028e84db4e8dc0b7b9dab18ad69b351ff4e1bef198d6b0b97f0000da059b3fd3dc394582"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) (async) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r9, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r10, 0x0, '\x00', 0x0, r8, 0x0, 0x1}, 0x48) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b40)={r7, 0xe0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000780)=[0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001980), &(0x7f00000019c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001a40)}}, 0x10) (rerun: 64) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001dc0)={&(0x7f0000001b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x143, 0x143, 0x7, [@typedef={0x3}, @typedef={0x8, 0x0, 0x0, 0x8, 0x1}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x55, 0x0, 0x48, 0x3}, @struct={0xf, 0xa, 0x0, 0x4, 0x1, 0x9, [{0xc, 0x5, 0xff}, {0xc, 0x3, 0x1}, {0x49e, 0x2, 0x2}, {0xb, 0x2, 0x1}, {0xa, 0x1, 0x447d}, {0xa, 0x0, 0x10001}, {0x4, 0x4, 0x401}, {0xb, 0x3, 0x3}, {0xb, 0x0, 0x3}, {0xb, 0x4, 0x2}]}, @datasec={0xe, 0x8, 0x0, 0xf, 0x3, [{0x5, 0x401, 0x401}, {0x1, 0x3, 0x80000001}, {0x4, 0x2}, {0x4, 0x401, 0x81}, {0x5, 0x7, 0x3}, {0x2, 0x1000, 0x101}, {0x3, 0xeb, 0x20}, {0x5, 0x7b, 0x6c}], "184ef3"}, @const={0x1, 0x0, 0x0, 0xa, 0x2}, @volatile={0x2, 0x0, 0x0, 0x9, 0x5}, @var={0x7, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x30, 0x0, 0x5f, 0x30, 0x0]}}, &(0x7f0000001d00)=""/171, 0x163, 0xab, 0x0, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001f40)={0x11, 0x1a, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000ff7f000000000000000200001800000000ffffff00000000faa2000085000000ab000000180000005e0400000000000040000000b7080000000000007b8af8ff00000000b7080000010000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70500000800000085003cc9bb51bdbbf8f9a700", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000000700)='GPL\x00', 0x8, 0x1000, &(0x7f0000000980)=""/4096, 0x41100, 0x11, '\x00', r11, 0x0, r12, 0x8, &(0x7f0000001e00)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000001e40)={0x1, 0x9, 0x400, 0x3f}, 0x10, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001e80)=[{0x5, 0x3, 0x4, 0x1}, {0x5, 0x4, 0x7, 0x5}, {0x3, 0x2, 0xd, 0x2}, {0x2, 0x5, 0xf, 0x8}, {0x2, 0x5, 0xd, 0x3}, {0x2, 0x5, 0x10}, {0x0, 0x4, 0xd, 0x2}, {0x5, 0x5, 0xa, 0x1}, {0x0, 0x1, 0x10, 0x8}], 0x10, 0x40}, 0x90) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r0, 0x20, &(0x7f0000000680)={&(0x7f00000005c0)=""/4, 0x4, 0x0, &(0x7f0000000600)=""/99, 0x63}}, 0x10) (async) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0x1f, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x0, 0x4, 0xfffffffffffffff5, 0xfffffffffffffffc}, @alu={0xe, 0x0, 0x2, 0x5, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7ff}, @generic={0x7f, 0x7, 0x2, 0x8, 0x1}, @map_val={0x18, 0x9, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1f}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x1a}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000880)='syzkaller\x00', 0xe316, 0x54, &(0x7f00000008c0)=""/84, 0x41000, 0x2b, '\x00', 0x0, 0xb, r0, 0x8, &(0x7f0000000940)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2, 0x3, &(0x7f0000000980)=[r0, r0, r0], &(0x7f00000009c0)=[{0x2, 0x2, 0xe, 0x1}, {0x4, 0x1, 0x6, 0x3}, {0x4, 0x2, 0xc, 0x7}]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x14, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0x8, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f00000002c0)='syzkaller\x00', 0x4, 0xea, &(0x7f0000000300)=""/234, 0x41000, 0x23, '\x00', r11, 0x32, r2, 0x8, &(0x7f0000000500)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x10, 0x1ff}, 0x10, r13, r14, 0x4, 0x0, &(0x7f0000000ac0)=[{0x4, 0x3, 0xa, 0xc}, {0x0, 0x4, 0x4}, {0x2, 0x4, 0x0, 0x3}, {0x4, 0x5, 0xc, 0x5}], 0x10, 0x6}, 0x90) r15 = getpid() perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x1, 0x96, 0x4, 0x80, 0x0, 0x5, 0x40000, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x3}, 0x440, 0x0, 0x1f, 0x1, 0x0, 0x4, 0x934, 0x0, 0x7fff, 0x0, 0x2b378a99}, r15, 0xb, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000022c0)={r7, 0xe0, &(0x7f00000021c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000002040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002080)=[0x0], 0x0, 0x8, &(0x7f00000020c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000002100), &(0x7f0000002140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002180)}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) [ 791.504744][T16508] team_slave_1: left allmulticast mode 07:27:30 executing program 0: r0 = socket$kcm(0x21, 0x2, 0xa) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000500), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) r3 = syz_clone(0x8000580, &(0x7f00000002c0)="3c151ab2748d6fdce1135174a851bd8fee798f6b79c516c95593b68f9f87da198e06448895400e699d6461273894d07e869efb68811561f3508a1a5790a401f52589fbe3c942d2b59b430be127a34d99cb1f43bfd726aac45c0171c54ec7934ed18fada1bf895d12e6d699fbfe4fa2841b1d815d825c3f0f55fc1f8b12922b58e5bd8237cf6affee9711b54f53030e18f17d3e425ecd41cb7eed57df47bd", 0x9e, &(0x7f0000000380), &(0x7f0000000440), &(0x7f0000000480)="c1acf3c527bcb7becec26b29fa1308294f1a68ca3b01042ef4942ac6b22f8a210e9d99838f9271e088196a6af2ab54fa9d93ab3741bba6da84d161d517d6ce8e7ed10b8bae43cea8bdc13e85") perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0xf9, 0x7, 0x40, 0x81, 0x0, 0xa44, 0x40000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x101}, 0x80002, 0x2, 0x0, 0x5, 0x7fff, 0x4, 0x2, 0x0, 0x9, 0x0, 0x8000000000000001}, r3, 0xa, r1, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0xf9, 0x7, 0x40, 0x81, 0x0, 0xa44, 0x40000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x101}, 0x80002, 0x2, 0x0, 0x5, 0x7fff, 0x4, 0x2, 0x0, 0x9, 0x0, 0x8000000000000001}, r3, 0xa, r1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="18b6af4999c5988dbede0eb9d5bcbac70300070000000000100100000b000000dc770ab3e4004411b096d656f83235a470d3ecf5cafc93da44470c779067e4104dd0e27512a830e9d977be2e63dc29002000000000"], 0x18}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='xprt_ping\x00', r4}, 0x10) [ 791.545071][T16508] bridge0: port 3(team0) entered disabled state [ 791.615009][T16508] batman_adv: batadv0: Adding interface: team0 [ 791.630450][T16508] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 791.681171][T16508] batman_adv: batadv0: Interface activated: team0 [ 791.718708][T16512] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 791.766352][T16512] batman_adv: batadv0: Adding interface: erspan0 [ 791.838601][T16512] batman_adv: batadv0: The MTU of interface erspan0 is too small (1450) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:31 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 791.960445][T16512] batman_adv: batadv0: Interface activated: erspan0 [ 792.030708][T16515] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 792.082077][T16515] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 792.210382][T16515] batman_adv: batadv0: Interface deactivated: team0 07:27:31 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848060000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 792.295946][T16515] batman_adv: batadv0: Removing interface: team0 [ 792.504403][T16515] bridge0: port 3(team0) entered blocking state [ 792.522091][T16515] bridge0: port 3(team0) entered disabled state [ 792.531329][T16515] team0: entered allmulticast mode [ 792.536832][T16515] team_slave_0: entered allmulticast mode [ 792.544207][T16515] team_slave_1: entered allmulticast mode [ 792.560387][T16515] bridge0: port 3(team0) entered blocking state [ 792.566951][T16515] bridge0: port 3(team0) entered forwarding state [ 792.645190][T16538] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 07:27:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:31 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:32 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848070000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:32 executing program 3: socketpair$unix(0x1, 0xf, 0x0, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001640)=[{0x0}, {&(0x7f0000000100)=""/239, 0xef}, {0x0}, {&(0x7f0000000340)=""/134, 0x86}, {&(0x7f0000000200)=""/182, 0xb6}, {&(0x7f0000000400)=""/203, 0xcb}, {&(0x7f0000000600)=""/4108, 0x100c}], 0x7, 0x0, 0x0, 0xffffffc3}, 0x0) write$cgroup_subtree(r1, &(0x7f0000001ec0)=ANY=[@ANYBLOB="13100000120091ef04e9befbbd00005c0a"], 0xfe33) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001a00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x4}, 0x48) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001a80)={0x0, 0x401, 0x8}, 0xc) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001ac0)=0xffffffffffffffff, 0x4) r5 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000001b00), 0x2, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b40), 0x80100, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e80)={0x1d, 0x15, &(0x7f0000001b80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x4, 0x0, 0xfb6169ee12bdc564, 0xa, 0x1, 0x100, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001c40)='syzkaller\x00', 0x3, 0xc0, &(0x7f0000001c80)=""/192, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001d40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000001d80)={0x4, 0xa, 0xffff, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001dc0)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000001e00)=[{0x4, 0x5, 0xf, 0x1}, {0x1, 0x5, 0x6, 0x5}, {0x5, 0x3, 0xb, 0xb}, {0x1, 0x1, 0x10, 0xb}, {0x0, 0x3, 0xb, 0x7}, {0x2, 0x2, 0x10}], 0x10, 0x4129}, 0x90) r9 = getpid() perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x9, 0x8, 0x0, 0x0, 0x3d86, 0x18040, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000b80)}, 0x8bb29, 0x6, 0x982b263b, 0x2, 0x64c, 0x0, 0x8008, 0x0, 0x10000004}, r9, 0x0, 0xffffffffffffffff, 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000a00)=@abs, 0x6e, &(0x7f0000001d00)=[{0x0}, {&(0x7f0000000b80)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001c00)=""/80, 0x50}], 0x4, &(0x7f0000001d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xc0}, 0x40012061) sendmsg$unix(0xffffffffffffffff, &(0x7f00000023c0)={&(0x7f0000001f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000001f80)="c7b013c52f2e21b968d96d56264dbb25fa3a1628389a", 0x16}, {0x0}], 0x2, &(0x7f00000022c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r13}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r12, 0xffffffffffffffff]}}], 0x88, 0x4008005}, 0x4004800) sendmsg$unix(r0, &(0x7f0000002000)={&(0x7f0000001880)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000019c0)=[{&(0x7f0000001900)="a49f6d1ce2ecc5bd960607710910a7d7f6415f7f57bd05b5e4dcb7db285d7954a283e3670c665c7c8345a04c21820a5af2c229456753ff6daf2b1fb8babbbfead9b7f855cb6e5563bf1f676a214adb94b0dde073a43276d78d8114a7e85ad75832176e4d7577a12fcda71f358117170cbe2ad9342ae011512c022c805fea8ce93037b2cf72b4022db546131b77dc1529a2d916d813471d9e3e462e153dc08f2ed784c209c6bf0718006f25c06185", 0xae}], 0x1, &(0x7f0000001f40)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @rights={{0x18, 0x1, 0x1, [r1, r2]}}, @rights={{0x18, 0x1, 0x1, [r3, r4]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r5, r6, r7, r8]}}, @cred={{0x1c, 0x1, 0x2, {r9, 0x0, r13}}}], 0x98}, 0x4004000) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r14}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r14}, 0x4) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r14}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r15, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r17 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xb, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @const={0xa, 0x0, 0x0, 0xa, 0x1}, @restrict={0x2, 0x0, 0x0, 0xb, 0x4}]}, {0x0, [0x2e, 0x61, 0x0, 0x30, 0x2e, 0x5f, 0x5f, 0x2e, 0x61]}}, &(0x7f0000000840)=""/4096, 0x47, 0x1000, 0x0, 0x7}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r14, 0x400, '\x00', r16, r17, 0x1, 0x2, 0x4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r15, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 792.930663][T16541] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 793.011323][T16541] team0: left allmulticast mode [ 793.100113][T16541] team_slave_0: left allmulticast mode 07:27:32 executing program 0: r0 = socket$kcm(0x21, 0x2, 0xa) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000500), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r2 = socket$kcm(0xa, 0x922000000003, 0x11) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) (async) r3 = syz_clone(0x8000580, &(0x7f00000002c0)="3c151ab2748d6fdce1135174a851bd8fee798f6b79c516c95593b68f9f87da198e06448895400e699d6461273894d07e869efb68811561f3508a1a5790a401f52589fbe3c942d2b59b430be127a34d99cb1f43bfd726aac45c0171c54ec7934ed18fada1bf895d12e6d699fbfe4fa2841b1d815d825c3f0f55fc1f8b12922b58e5bd8237cf6affee9711b54f53030e18f17d3e425ecd41cb7eed57df47bd", 0x9e, &(0x7f0000000380), &(0x7f0000000440), &(0x7f0000000480)="c1acf3c527bcb7becec26b29fa1308294f1a68ca3b01042ef4942ac6b22f8a210e9d99838f9271e088196a6af2ab54fa9d93ab3741bba6da84d161d517d6ce8e7ed10b8bae43cea8bdc13e85") perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0xf9, 0x7, 0x40, 0x81, 0x0, 0xa44, 0x40000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x101}, 0x80002, 0x2, 0x0, 0x5, 0x7fff, 0x4, 0x2, 0x0, 0x9, 0x0, 0x8000000000000001}, r3, 0xa, r1, 0x0) (async) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="18b6af4999c5988dbede0eb9d5bcbac70300070000000000100100000b000000dc770ab3e4004411b096d656f83235a470d3ecf5cafc93da44470c779067e4104dd0e27512a830e9d977be2e63dc29002000000000"], 0x18}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='xprt_ping\x00', r4}, 0x10) [ 793.264361][T16541] team_slave_1: left allmulticast mode [ 793.274295][T16551] netlink: 4083 bytes leftover after parsing attributes in process `syz-executor.3'. [ 793.303712][T16541] bridge0: port 3(team0) entered disabled state [ 793.397469][T16541] batman_adv: batadv0: Adding interface: team0 [ 793.403946][T16541] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 793.485881][T16541] batman_adv: batadv0: Interface activated: team0 [ 793.495183][T16544] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 793.506523][T16544] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 793.517100][T16544] batman_adv: batadv0: Interface deactivated: team0 [ 793.525921][T16544] batman_adv: batadv0: Removing interface: team0 07:27:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 793.570905][T16544] bridge0: port 3(team0) entered blocking state [ 793.583663][T16544] bridge0: port 3(team0) entered disabled state [ 793.603844][T16544] team0: entered allmulticast mode [ 793.614790][T16544] team_slave_0: entered allmulticast mode [ 793.626574][T16544] team_slave_1: entered allmulticast mode [ 793.642032][T16544] bridge0: port 3(team0) entered blocking state [ 793.648733][T16544] bridge0: port 3(team0) entered forwarding state [ 793.657414][T16550] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 07:27:32 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:32 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848040000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:32 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848080000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 793.714041][T16560] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 793.738699][T16560] team0: left allmulticast mode [ 793.751504][T16560] team_slave_0: left allmulticast mode 07:27:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 793.761952][T16560] team_slave_1: left allmulticast mode [ 793.798908][T16560] bridge0: port 3(team0) entered disabled state [ 793.928625][T16560] batman_adv: batadv0: Adding interface: team0 [ 793.943764][T16560] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 794.007887][T16560] batman_adv: batadv0: Interface activated: team0 [ 794.033278][T16563] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 794.053560][T16563] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. [ 794.083176][T16563] batman_adv: batadv0: Interface deactivated: team0 [ 794.095893][T16563] batman_adv: batadv0: Removing interface: team0 [ 794.108182][T16563] bridge0: port 3(team0) entered blocking state [ 794.120603][T16563] bridge0: port 3(team0) entered disabled state [ 794.132320][T16563] team0: entered allmulticast mode [ 794.143662][T16563] team_slave_0: entered allmulticast mode [ 794.152926][T16563] team_slave_1: entered allmulticast mode [ 794.169978][T16563] bridge0: port 3(team0) entered blocking state [ 794.176553][T16563] bridge0: port 3(team0) entered forwarding state [ 794.187043][T16566] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 794.206372][T16566] team0: left allmulticast mode [ 794.211782][T16566] team_slave_0: left allmulticast mode [ 794.219065][T16566] team_slave_1: left allmulticast mode 07:27:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 794.235745][T16566] bridge0: port 3(team0) entered disabled state [ 794.307719][T16566] batman_adv: batadv0: Adding interface: team0 [ 794.317641][T16566] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 794.359834][T16566] batman_adv: batadv0: Interface activated: team0 07:27:33 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848090000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:33 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 794.407729][T16570] batman_adv: batadv0: Adding interface: gretap0 [ 794.414254][T16570] batman_adv: batadv0: The MTU of interface gretap0 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 794.445807][T16570] batman_adv: batadv0: Interface activated: gretap0 07:27:33 executing program 3: socketpair$unix(0x1, 0xf, 0x0, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001640)=[{0x0}, {&(0x7f0000000100)=""/239, 0xef}, {0x0}, {&(0x7f0000000340)=""/134, 0x86}, {&(0x7f0000000200)=""/182, 0xb6}, {&(0x7f0000000400)=""/203, 0xcb}, {&(0x7f0000000600)=""/4108, 0x100c}], 0x7, 0x0, 0x0, 0xffffffc3}, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000001ec0)=ANY=[@ANYBLOB="13100000120091ef04e9befbbd00005c0a"], 0xfe33) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001a00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x4}, 0x48) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001a80)={0x0, 0x401, 0x8}, 0xc) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001ac0)=0xffffffffffffffff, 0x4) (async, rerun: 32) r5 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000001b00), 0x2, 0x0) (async, rerun: 32) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b40), 0x80100, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e80)={0x1d, 0x15, &(0x7f0000001b80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x4, 0x0, 0xfb6169ee12bdc564, 0xa, 0x1, 0x100, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001c40)='syzkaller\x00', 0x3, 0xc0, &(0x7f0000001c80)=""/192, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001d40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000001d80)={0x4, 0xa, 0xffff, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001dc0)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000001e00)=[{0x4, 0x5, 0xf, 0x1}, {0x1, 0x5, 0x6, 0x5}, {0x5, 0x3, 0xb, 0xb}, {0x1, 0x1, 0x10, 0xb}, {0x0, 0x3, 0xb, 0x7}, {0x2, 0x2, 0x10}], 0x10, 0x4129}, 0x90) (async) r9 = getpid() perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x9, 0x8, 0x0, 0x0, 0x3d86, 0x18040, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000b80)}, 0x8bb29, 0x6, 0x982b263b, 0x2, 0x64c, 0x0, 0x8008, 0x0, 0x10000004}, r9, 0x0, 0xffffffffffffffff, 0x8) (async, rerun: 64) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000a00)=@abs, 0x6e, &(0x7f0000001d00)=[{0x0}, {&(0x7f0000000b80)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001c00)=""/80, 0x50}], 0x4, &(0x7f0000001d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xc0}, 0x40012061) (rerun: 64) sendmsg$unix(0xffffffffffffffff, &(0x7f00000023c0)={&(0x7f0000001f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000001f80)="c7b013c52f2e21b968d96d56264dbb25fa3a1628389a", 0x16}, {0x0}], 0x2, &(0x7f00000022c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r13}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r12, 0xffffffffffffffff]}}], 0x88, 0x4008005}, 0x4004800) sendmsg$unix(r0, &(0x7f0000002000)={&(0x7f0000001880)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000019c0)=[{&(0x7f0000001900)="a49f6d1ce2ecc5bd960607710910a7d7f6415f7f57bd05b5e4dcb7db285d7954a283e3670c665c7c8345a04c21820a5af2c229456753ff6daf2b1fb8babbbfead9b7f855cb6e5563bf1f676a214adb94b0dde073a43276d78d8114a7e85ad75832176e4d7577a12fcda71f358117170cbe2ad9342ae011512c022c805fea8ce93037b2cf72b4022db546131b77dc1529a2d916d813471d9e3e462e153dc08f2ed784c209c6bf0718006f25c06185", 0xae}], 0x1, &(0x7f0000001f40)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @rights={{0x18, 0x1, 0x1, [r1, r2]}}, @rights={{0x18, 0x1, 0x1, [r3, r4]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r5, r6, r7, r8]}}, @cred={{0x1c, 0x1, 0x2, {r9, 0x0, r13}}}], 0x98}, 0x4004000) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r14}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async, rerun: 64) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r14}, 0x4) (async, rerun: 64) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r14}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r15, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async, rerun: 64) r17 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xb, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @const={0xa, 0x0, 0x0, 0xa, 0x1}, @restrict={0x2, 0x0, 0x0, 0xb, 0x4}]}, {0x0, [0x2e, 0x61, 0x0, 0x30, 0x2e, 0x5f, 0x5f, 0x2e, 0x61]}}, &(0x7f0000000840)=""/4096, 0x47, 0x1000, 0x0, 0x7}, 0x20) (rerun: 64) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r14, 0x400, '\x00', r16, r17, 0x1, 0x2, 0x4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r15, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 794.484423][T16569] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 794.526875][T16569] batman_adv: batadv0: Interface deactivated: team0 [ 794.538727][T16569] batman_adv: batadv0: Removing interface: team0 [ 794.569706][T16569] bridge0: port 3(team0) entered blocking state [ 794.584477][T16569] bridge0: port 3(team0) entered disabled state [ 794.594465][T16569] team0: entered allmulticast mode [ 794.608109][T16569] team_slave_0: entered allmulticast mode [ 794.626133][T16569] team_slave_1: entered allmulticast mode [ 794.649958][T16569] bridge0: port 3(team0) entered blocking state [ 794.656519][T16569] bridge0: port 3(team0) entered forwarding state 07:27:33 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848040000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 794.667546][T16585] netlink: 4083 bytes leftover after parsing attributes in process `syz-executor.3'. 07:27:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 794.701914][T16575] team0: left allmulticast mode [ 794.707261][T16575] team_slave_0: left allmulticast mode [ 794.715302][T16575] team_slave_1: left allmulticast mode [ 794.742086][T16575] bridge0: port 3(team0) entered disabled state [ 794.785233][T16575] batman_adv: batadv0: Adding interface: team0 [ 794.793418][T16575] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 794.840585][T16575] batman_adv: batadv0: Interface activated: team0 [ 794.856724][T16578] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. [ 794.881241][T16578] batman_adv: batadv0: Interface deactivated: team0 [ 794.909465][T16578] batman_adv: batadv0: Removing interface: team0 [ 794.934813][T16578] bridge0: port 3(team0) entered blocking state [ 794.941761][T16578] bridge0: port 3(team0) entered disabled state [ 794.952594][T16578] team0: entered allmulticast mode [ 794.963626][T16578] team_slave_0: entered allmulticast mode [ 794.973174][T16578] team_slave_1: entered allmulticast mode 07:27:34 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480a0000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:34 executing program 3: socketpair$unix(0x1, 0xf, 0x0, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001640)=[{0x0}, {&(0x7f0000000100)=""/239, 0xef}, {0x0}, {&(0x7f0000000340)=""/134, 0x86}, {&(0x7f0000000200)=""/182, 0xb6}, {&(0x7f0000000400)=""/203, 0xcb}, {&(0x7f0000000600)=""/4108, 0x100c}], 0x7, 0x0, 0x0, 0xffffffc3}, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000001ec0)=ANY=[@ANYBLOB="13100000120091ef04e9befbbd00005c0a"], 0xfe33) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001a00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x4}, 0x48) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001a80)={0x0, 0x401, 0x8}, 0xc) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001ac0)=0xffffffffffffffff, 0x4) r5 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000001b00), 0x2, 0x0) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b40), 0x80100, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e80)={0x1d, 0x15, &(0x7f0000001b80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x4, 0x0, 0xfb6169ee12bdc564, 0xa, 0x1, 0x100, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001c40)='syzkaller\x00', 0x3, 0xc0, &(0x7f0000001c80)=""/192, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001d40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000001d80)={0x4, 0xa, 0xffff, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001dc0)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000001e00)=[{0x4, 0x5, 0xf, 0x1}, {0x1, 0x5, 0x6, 0x5}, {0x5, 0x3, 0xb, 0xb}, {0x1, 0x1, 0x10, 0xb}, {0x0, 0x3, 0xb, 0x7}, {0x2, 0x2, 0x10}], 0x10, 0x4129}, 0x90) r9 = getpid() perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x9, 0x8, 0x0, 0x0, 0x3d86, 0x18040, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000b80)}, 0x8bb29, 0x6, 0x982b263b, 0x2, 0x64c, 0x0, 0x8008, 0x0, 0x10000004}, r9, 0x0, 0xffffffffffffffff, 0x8) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000a00)=@abs, 0x6e, &(0x7f0000001d00)=[{0x0}, {&(0x7f0000000b80)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001c00)=""/80, 0x50}], 0x4, &(0x7f0000001d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xc0}, 0x40012061) sendmsg$unix(0xffffffffffffffff, &(0x7f00000023c0)={&(0x7f0000001f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000001f80)="c7b013c52f2e21b968d96d56264dbb25fa3a1628389a", 0x16}, {0x0}], 0x2, &(0x7f00000022c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r13}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r12, 0xffffffffffffffff]}}], 0x88, 0x4008005}, 0x4004800) (async) sendmsg$unix(r0, &(0x7f0000002000)={&(0x7f0000001880)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000019c0)=[{&(0x7f0000001900)="a49f6d1ce2ecc5bd960607710910a7d7f6415f7f57bd05b5e4dcb7db285d7954a283e3670c665c7c8345a04c21820a5af2c229456753ff6daf2b1fb8babbbfead9b7f855cb6e5563bf1f676a214adb94b0dde073a43276d78d8114a7e85ad75832176e4d7577a12fcda71f358117170cbe2ad9342ae011512c022c805fea8ce93037b2cf72b4022db546131b77dc1529a2d916d813471d9e3e462e153dc08f2ed784c209c6bf0718006f25c06185", 0xae}], 0x1, &(0x7f0000001f40)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @rights={{0x18, 0x1, 0x1, [r1, r2]}}, @rights={{0x18, 0x1, 0x1, [r3, r4]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r5, r6, r7, r8]}}, @cred={{0x1c, 0x1, 0x2, {r9, 0x0, r13}}}], 0x98}, 0x4004000) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r14}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r14}, 0x4) (async) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r14}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r15, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) r17 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xb, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @const={0xa, 0x0, 0x0, 0xa, 0x1}, @restrict={0x2, 0x0, 0x0, 0xb, 0x4}]}, {0x0, [0x2e, 0x61, 0x0, 0x30, 0x2e, 0x5f, 0x5f, 0x2e, 0x61]}}, &(0x7f0000000840)=""/4096, 0x47, 0x1000, 0x0, 0x7}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r14, 0x400, '\x00', r16, r17, 0x1, 0x2, 0x4}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r15, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 794.991315][T16578] bridge0: port 3(team0) entered blocking state [ 794.997927][T16578] bridge0: port 3(team0) entered forwarding state [ 795.016272][T16591] team0: left allmulticast mode [ 795.021757][T16591] team_slave_0: left allmulticast mode 07:27:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:34 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 795.065997][T16591] team_slave_1: left allmulticast mode [ 795.072942][T16591] bridge0: port 3(team0) entered disabled state 07:27:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 795.191423][T16600] netlink: 4083 bytes leftover after parsing attributes in process `syz-executor.3'. [ 795.242000][T16591] batman_adv: batadv0: Adding interface: team0 [ 795.251623][T16591] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 795.341116][T16591] batman_adv: batadv0: Interface activated: team0 [ 795.375140][T16593] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 795.420616][T16593] batman_adv: batadv0: Interface deactivated: team0 [ 795.435807][T16593] batman_adv: batadv0: Removing interface: team0 [ 795.454717][T16593] bridge0: port 3(team0) entered blocking state [ 795.469248][T16593] bridge0: port 3(team0) entered disabled state [ 795.480502][T16593] team0: entered allmulticast mode [ 795.490956][T16593] team_slave_0: entered allmulticast mode [ 795.524355][T16593] team_slave_1: entered allmulticast mode [ 795.546347][T16593] bridge0: port 3(team0) entered blocking state [ 795.552917][T16593] bridge0: port 3(team0) entered forwarding state 07:27:34 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 795.579751][T16606] team0: left allmulticast mode [ 795.591328][T16606] team_slave_0: left allmulticast mode 07:27:34 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e40)={0x6, 0x6, &(0x7f0000000f80)=ANY=[], &(0x7f0000000cc0)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x53, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000d40)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000e00)=[{0x0, 0x5}], 0x10, 0x8}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 07:27:34 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480b0000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 795.622306][T16606] team_slave_1: left allmulticast mode [ 795.656524][T16606] bridge0: port 3(team0) entered disabled state [ 795.748392][T16606] batman_adv: batadv0: Adding interface: team0 [ 795.786040][T16606] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 795.823448][T16606] batman_adv: batadv0: Interface activated: team0 [ 795.848326][T16607] batman_adv: batadv0: Adding interface: team0 [ 795.862774][T16607] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 795.907832][T16607] batman_adv: batadv0: Interface activated: team0 [ 795.922557][T16608] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. [ 795.941108][T16608] batman_adv: batadv0: Interface deactivated: team0 [ 795.948383][T16608] batman_adv: batadv0: Removing interface: team0 [ 795.960153][T16608] bridge0: port 3(team0) entered blocking state [ 795.968731][T16608] bridge0: port 3(team0) entered disabled state [ 795.975401][T16608] team0: entered allmulticast mode [ 795.987686][T16608] team_slave_0: entered allmulticast mode [ 795.993582][T16608] team_slave_1: entered allmulticast mode [ 796.010009][T16608] bridge0: port 3(team0) entered blocking state [ 796.016573][T16608] bridge0: port 3(team0) entered forwarding state [ 796.027630][T16609] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. [ 796.038488][T16609] batman_adv: batadv0: Interface deactivated: team0 [ 796.047364][T16609] batman_adv: batadv0: Removing interface: team0 07:27:35 executing program 0: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:35 executing program 4: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29016, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0), 0x0) r3 = syz_clone(0x200000, &(0x7f0000000780)="266823c8ff44b838010d5eb00e5e89e762ecbf9355446c8fdb94fe9565ed555aa3b2242f1375f11cb0ddfc24c2be8a05e26de1cceb4276e8d36aeb06e6bb35298f88321a70eebb3158745e002d9054daba6cc8a9956216e6598bb12b1f6274ecca389b00f3f3838040bc186375e470b0c84afc61fc973d66a524b76a246541317a3f7ac3c058801ac8bc329c38d58fe405928ef0141120f5b03a0de8a160b7500a69f159c0f29f906a894195054fcfb1e460d64504aad38554350557e6254f86d2de1141d50d0c0f10343e41b79118b18450312db615d7605e6aee9e5aa2bc3794a071b4a9e3ce3719d079d1130be07ecf7e28e770613313c33d71331ff29b80833bab966ac98a21fe99abc9e06e7632f9a711220d401ab61fa3ac413e1b4785047e2c9452f8dc01e389a8ccfa8166d2a0fa6bc291fc9f71b1cab9204db7952abe2c38a2f764d6d75027e45d4ca0a12fdbf256c7fab7f4f005c48e9cebaa6af971f037d26b3c7bb781e37de4a13221d24d0a9e88891899f9076b532229365f891e83bd6f854fca6efd433d496ea0f7a375e20d8a352bfc6c2c50b8aca9a3f058a9a0d57d44736c93ab3764bd45f3a4e8b982df147cc857a3d4212272838d4ee4d2eab5637da7015b252ce83f9cd384f05c8d4c0691b9ca6ef36bedb945ddf1df4a58c6166d8114fea48bf21cb0febc920dc6bf35d49b604c6fe8de8d8b8a7115c35f279a5076bbd6036efc05b1f6a174272f7a292a89b45402f376f5e4e44d69fb282f2f2acffa8c2a99ae5917832d2c05f45bb054af070a474c14bcbefdfdcaefa0d03e6e607be90e4e03a453094f59d406e1c03e5e7e10b452df5df69a0ac898feba550bb2eff6fd63759dfb7491cce630848d17d7cc574b8079e3d2f78cc585723ab2fd7b344ad7049016e0b33c42f6ff50a8b1fc379dd9e84a2405a3ca872ca8fd7e78f05c54e18b50e53dfd7dabc5724a6ae05a59c51f5c62831fbadf6e215582d307ff489860ed849756f33e162ece4cb1fbbb0ea67fdc970da5dd04ff2fd7510d5f11d4932a2607258ed5c2f771d849da288d76c538b174947d684ec6fbfe208027732ccbd5b17ee4dc5b3b56769aa42b4524fc100c09c5e22a017d745239714f363799c58840352d87fc95d1ba2d56e645023059f6183808fcd4bbc1cc77a9049322e721dac11d28c89e7bcc49178841a0a2743e277f822297ef89d294809c4b89c97f7daa601cbfcc6ccc036fa920c79526680f9aaaa5b3b942f9964b12c5d686f3d8afe1f34c736438ca2dbff134ccae9cece6149025ddcd76ddfa6f2fa1480d88d388c5bd4696c4a6d3a679826ff7356de1611970273c90a8f6ee9cfc45b5a75b12dba99c4104b6418d2c79bfdd0ceba1f95004b310adcdb67d5d9aeb3ed200c52a0beabd2606ad9d817ae23c6186385b7e01e4e2d3b1c97f2d6b9847568d4e942022fc9d6eba8721510748db139c487f1701ecf72301722a3f0d402bfe21d3477f223cf54962b5aef1d9019f3f030901a58d3075fa7a0b78dce02a8143c3675900d4e4e935e906b867c8878cac7da0f46f570ab94ea9b23ab43f2b70b2d9b85b796fad238533193863b0020ea9c7d53e1d8270205600a419d6c82c9fd94b9790b293a94804bd36e66fff8aa6c319868efe20fbf5b00a716203b9ce9030a22d2a86fb34173578e61ccfb20050efe0a68c9888daa51b3d31ce6e6ca434d87baa2563dfc48e0d23b02274dc1f208a5c8d73b35d5b228013fc4306129eb471da8720ebd05494c9f06109f8745dea94efce386303f434e12ba97824ad23dfbbd97794b0608c35c811ae462af2dee2b136e8a859407e5f208e746690735ccaae1b9c911877ee718e7af5b0416ddc8ddcf9dde1eeffffd402ee40baae21b052ac9f14dd94cfb3389b884fcd6f4eb9735c6b50de1f3986597db252547e63c7a70cd3f1ccbf4408899d2b04ed902adad09cf7fdb56b85827205af3496acb6ea745ee0fe6e03a5c3a54eddfd39eb90f582851e4dc7e9a9abe1510092f1a83c7634aa573c6eafd8e1191e79a9ed2e4cd057d2d144a168ad7bb73acc676fef64329c9c79a9250942e8f764e7a9fed2dd15c5fc6ea21335fe896942c765aab8c0efe4f7105065239451a896e54bc670c604d38020777406ff61797296673e0367a4fe32a277a1c129c13bcba6d27d1e9e2f92d6f14658f5c9d0b47159b9a535c6ef23985992fa8303ddc064d6cf01930a3239d79abc95e11c2bfe1f5c30720edb591b5fddbf07ecd8bc25dab08cc135905d12d9e4fa93de79b287e964077d3907950f01aa0071001cd6f51304d4a35cc63eda44545309cdac3b2c8a0f5644fbd155d8f26f3e7dd7a87bcbd4bb5e2570ae552a7767e2a3fc341abd205955d91915113946ed784d9bce92e0ca57b8f9ba30c822b24b4babc5ba9130c2d0b35d2d5abc83308b2dbe1a15d000ea5304cb20f272dc6471b7c6a879633ef8080080c7ff7def1094fe55a6de478e2678add5a94366b3fd7e9e4e861f8a02b308474f7f3f573475ad4afd703b1796f258b336f104b893dfd82e102a9ccedc78fd7440e9c3d3080e8016aa37b958ded7227b2e8254e6797f25cd4558df265dd46019d61432bea4145fbba76636b1f4ef806529e76bc5ee0a2d16220be00d9e518428b06e586f19eb5078abf36bae7b9898aa317018ea4745e95259b17f7bf783886b6416b991edf6e0e66b81bb1dcaa780c097b2d85e32d1cf502c7cd77c7dba15760c47210002c98c447773b06cb5457027c527d3896da597cb9887222810931cac375c81d7d4f6a4170befce432f5cc7be4388072a597a2d4098439c88d6b01feab1810a66d0bd62e0bb6b6b1fb11cf542eb10bc82020e5d5be8ff52bf988eb96a56111f77110a3aec4e266838a87b5cf6769b50962906ba4fb3aaebf2516259c8a29a23a1540d89fe3753139332c322fb471eff88cf76b1944ba8c1239aa53dcc34ee7138de8ad08bf0d9aa87bc421f268a9c18053ec48cd3c2a7c7b0238b56bf68908b6af89082cfd74bcc1cd9442301474e9eeb460a31a86d74c41f1fd4523ddff85f3b82a0d7e4d65d8e40e0ce5389ff6f49f26887b276c888acba3c26d8f3ce720bf3be1091d73d0439fc572e46d6ab9da433dae6c42022f0263756194ded61cdbce28a18a508ccb45d173c1467c008fd9b5c1c294aade5b72bfbce3eb20bb915dddf1dc8b8aa1841be675d920e455a5fd734de379f06dcef86283f0b71cf5c0122f6c8ef87abf7b6923389ef47b22486d9422a5c56e6b208b899fb782fba23d058d3c7b5337869c97becdda56725e9940d0005c6c54fa6b1b6518b3bc3a2c2469bee986474063a2af04f4a13531275775525365c281e111063ad3ac58a6ea6caf44d7beb0f8943fdbf5da37b3e8db06d481f49d1be93f97319a894d6b964ea0a21a7fac720dce027cda2f7415080bf34dfd9bba86d1c3db683ec1440e8299e322ded07c7435adcff39a1a9bc8c01da3938f9feeb27b3e21e12d84ddb56f645040cbe1e2a5f6f148e9ea1d0eec47f5d79b70427746bffba4c30559ac480ccd6c18e8852fc10b52fa1d4f6a24eff49bd927310b1ec19e427efbe3c2172081b8c7b5fd9fe6b7c16798d5c3c6eaf3337f62f8a909b5fbb1f3219dfa2c6a69c7e0fa65eae38ce7461d5804ce7f5c33673422bfbb14df4f5ccbc0551519cfc9018a6f3fbdebd67a780bb12d0686e817eafb37fc89efdf6bf5d058ce988dd037da92395ef662f704877457a490c2997bb000af6611d53363bc2342ff010c0fc44e127d40e9d2cd2d0f6e60c074c6cb6d10082ea92f11dab5b6c84a14b6748340e846e316cbd638b345ef6e73d402f336773c6b6376bb2949b0501a3af5c2d007cf49266a4308981bbfeffae3aeb1d71dc9d45e4f053c850d3cde4d8adbe76222ca477bdb53aa4ff58425c498c1023ee4e7f3b20b4f7100472d83edc5b101d7a41cdbcc985312043c357e960ec156a6749b4b831af39c0c28c9f07a0c4b256bb9d9404b31115a8416888d390311bb72e66a57caa027ad7837b5918017b1a26a8cef0881f0a187a069f0e0d7b6cafe3ab41eb777e28da165c6d8470423a1073df50dab0d576908e84a1b71498c0737825b6a230fdd819c38556fa7ffe1344855851dfd162c928d386aea48baf1bceb627212d7635d41363f22276a79d5e93882f5994471ed82b5692b1969675f0957b9c4684fcc356a3198caa466e5a947805b9a20d3dba04b357c11ddf03c00052d86c8d2d62da85ed024814b5721957cfc1d6d5c7a7678bea1ae92cb3f4b17ba400c7a2ebd8579770e3121c95", 0xbf5, &(0x7f00000000c0), &(0x7f0000000580), &(0x7f00000004c0)="4b92beb378e845b90500000000000000000000000000000000000000000047570657fc9d91900c7645dd43f26a56ff96ff95b407602f2991ea3e7dedee86b5f236f6514eb09f0fb80be3b562b020d4d71180ec008d2674d35508beb4932c533c1b6623fc405f153095abc42b969ef14305b963fc7c456926f23744c0c0be5f9da0a5032b2c8f") perf_event_open(0x0, r3, 0x6, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000080)='blkio.throttle.io_serviced\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xffffffffffffff5b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) socketpair(0x0, 0x3, 0x1, &(0x7f0000000100)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f00000002c0)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000002480)=[{&(0x7f0000000200), 0xffffffffffffffdb}, {&(0x7f0000002500)=""/214, 0xd6}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000000240)=""/101, 0x65}, {&(0x7f0000000600)=""/165, 0xe7}, {&(0x7f0000002380)=""/200, 0xc8}], 0x10000000000001b7}, 0x2102) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x26e1, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r6, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) [ 796.084998][T16614] batman_adv: batadv0: Adding interface: syz_tun [ 796.098435][T16614] batman_adv: batadv0: The MTU of interface syz_tun is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:35 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 796.166442][T16614] batman_adv: batadv0: Interface activated: syz_tun 07:27:35 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480c0000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:35 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e40)={0x6, 0x6, &(0x7f0000000f80)=ANY=[], &(0x7f0000000cc0)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x53, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000d40)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000e00)=[{0x0, 0x5}], 0x10, 0x8}, 0x90) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r2}, 0x4) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 796.327777][T16622] validate_nla: 15 callbacks suppressed [ 796.356047][T16622] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 796.375772][T16622] team0: left allmulticast mode [ 796.388761][T16622] team_slave_0: left allmulticast mode 07:27:35 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e40)={0x6, 0x6, &(0x7f0000000f80)=ANY=[], &(0x7f0000000cc0)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x53, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000d40)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000e00)=[{0x0, 0x5}], 0x10, 0x8}, 0x90) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r2}, 0x4) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 796.457744][T16622] team_slave_1: left allmulticast mode [ 796.510138][T16622] bridge0: port 3(team0) entered disabled state [ 796.648569][T16622] batman_adv: batadv0: Adding interface: team0 [ 796.675742][T16622] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:35 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000100)='./file0\x00', r1}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) close(r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 796.722751][T16622] batman_adv: batadv0: Interface activated: team0 [ 796.736233][T16628] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 796.750637][T16628] batman_adv: batadv0: Adding interface: ip6gretap0 [ 796.759026][T16628] batman_adv: batadv0: The MTU of interface ip6gretap0 is too small (1434) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 796.788700][T16628] batman_adv: batadv0: Interface activated: ip6gretap0 [ 796.799191][T16629] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 796.813623][T16629] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 07:27:36 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:36 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000100)='./file0\x00', r1}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) close(r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000100)='./file0\x00', r1}, 0x18) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) close(r2) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) [ 796.913821][T16629] batman_adv: batadv0: Interface deactivated: team0 [ 796.953424][T16629] batman_adv: batadv0: Removing interface: team0 [ 796.974862][T16629] bridge0: port 3(team0) entered blocking state [ 796.989414][T16629] bridge0: port 3(team0) entered disabled state [ 796.996417][T16629] team0: entered allmulticast mode [ 797.001729][T16629] team_slave_0: entered allmulticast mode [ 797.009878][T16629] team_slave_1: entered allmulticast mode 07:27:36 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 797.020476][T16629] bridge0: port 3(team0) entered blocking state [ 797.027036][T16629] bridge0: port 3(team0) entered forwarding state [ 797.050942][T16638] warning: `syz-executor.4' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 07:27:36 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000100)='./file0\x00', r1}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000100)='./file0\x00', r1}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) close(r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 07:27:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 797.124959][T16644] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 07:27:36 executing program 4: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29016, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0), 0x0) syz_clone(0x200000, &(0x7f0000000780)="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", 0xbf5, &(0x7f00000000c0), &(0x7f0000000580), &(0x7f00000004c0)="4b92beb378e845b90500000000000000000000000000000000000000000047570657fc9d91900c7645dd43f26a56ff96ff95b407602f2991ea3e7dedee86b5f236f6514eb09f0fb80be3b562b020d4d71180ec008d2674d35508beb4932c533c1b6623fc405f153095abc42b969ef14305b963fc7c456926f23744c0c0be5f9da0a5032b2c8f") (async) r3 = syz_clone(0x200000, &(0x7f0000000780)="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", 0xbf5, &(0x7f00000000c0), &(0x7f0000000580), &(0x7f00000004c0)="4b92beb378e845b90500000000000000000000000000000000000000000047570657fc9d91900c7645dd43f26a56ff96ff95b407602f2991ea3e7dedee86b5f236f6514eb09f0fb80be3b562b020d4d71180ec008d2674d35508beb4932c533c1b6623fc405f153095abc42b969ef14305b963fc7c456926f23744c0c0be5f9da0a5032b2c8f") perf_event_open(0x0, r3, 0x6, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000080)='blkio.throttle.io_serviced\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xffffffffffffff5b) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xffffffffffffff5b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) socketpair(0x0, 0x3, 0x1, &(0x7f0000000100)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f00000002c0)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000002480)=[{&(0x7f0000000200), 0xffffffffffffffdb}, {&(0x7f0000002500)=""/214, 0xd6}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000000240)=""/101, 0x65}, {&(0x7f0000000600)=""/165, 0xe7}, {&(0x7f0000002380)=""/200, 0xc8}], 0x10000000000001b7}, 0x2102) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x26e1, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x26e1, 0x0) close(r6) (async) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r6, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) [ 797.179992][T16644] batman_adv: batadv0: Adding interface: bridge0 [ 797.221450][T16644] batman_adv: batadv0: The MTU of interface bridge0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:36 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0xc, &(0x7f0000000100)=@raw=[@map_fd={0x18, 0x5, 0x1, 0x0, r0}, @generic={0x1, 0x3, 0x9, 0x400, 0x3}, @jmp={0x5, 0x0, 0x3, 0x5, 0x0, 0x20, 0xfffffffffffffff0}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000000}}], &(0x7f0000000000)='syzkaller\x00', 0x6, 0x0, 0x0, 0x21600, 0x1, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r2, r0, r2, r0, r1, r2, r1], &(0x7f0000000880)=[{0x0, 0x5, 0x3, 0x2}, {0x3, 0x4, 0xc, 0xa}, {0x4, 0x4, 0x0, 0xb}]}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 797.342821][T16644] batman_adv: batadv0: Interface activated: bridge0 [ 797.393845][T16656] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 797.412620][T16656] team0: left allmulticast mode [ 797.426400][T16656] team_slave_0: left allmulticast mode [ 797.432091][T16656] team_slave_1: left allmulticast mode 07:27:36 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480e0000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 797.458876][T16656] bridge0: port 3(team0) entered disabled state [ 797.523807][T16656] batman_adv: batadv0: Adding interface: team0 [ 797.559514][T16656] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:36 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) [ 797.630222][T16656] batman_adv: batadv0: Interface activated: team0 07:27:36 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0xc, &(0x7f0000000100)=@raw=[@map_fd={0x18, 0x5, 0x1, 0x0, r0}, @generic={0x1, 0x3, 0x9, 0x400, 0x3}, @jmp={0x5, 0x0, 0x3, 0x5, 0x0, 0x20, 0xfffffffffffffff0}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000000}}], &(0x7f0000000000)='syzkaller\x00', 0x6, 0x0, 0x0, 0x21600, 0x1, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r2, r0, r2, r0, r1, r2, r1], &(0x7f0000000880)=[{0x0, 0x5, 0x3, 0x2}, {0x3, 0x4, 0xc, 0xa}, {0x4, 0x4, 0x0, 0xb}]}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 797.692858][T16659] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 797.780054][T16659] batman_adv: batadv0: Adding interface: team0 07:27:37 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0xc, &(0x7f0000000100)=@raw=[@map_fd={0x18, 0x5, 0x1, 0x0, r0}, @generic={0x1, 0x3, 0x9, 0x400, 0x3}, @jmp={0x5, 0x0, 0x3, 0x5, 0x0, 0x20, 0xfffffffffffffff0}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000000}}], &(0x7f0000000000)='syzkaller\x00', 0x6, 0x0, 0x0, 0x21600, 0x1, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[r2, r0, r2, r0, r1, r2, r1], &(0x7f0000000880)=[{0x0, 0x5, 0x3, 0x2}, {0x3, 0x4, 0xc, 0xa}, {0x4, 0x4, 0x0, 0xb}]}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 797.810525][T16659] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 797.867996][T16659] batman_adv: batadv0: Interface activated: team0 07:27:37 executing program 4: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29016, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x4, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400), 0x4) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0), 0x0) (async) r3 = syz_clone(0x200000, &(0x7f0000000780)="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", 0xbf5, &(0x7f00000000c0), &(0x7f0000000580), &(0x7f00000004c0)="4b92beb378e845b90500000000000000000000000000000000000000000047570657fc9d91900c7645dd43f26a56ff96ff95b407602f2991ea3e7dedee86b5f236f6514eb09f0fb80be3b562b020d4d71180ec008d2674d35508beb4932c533c1b6623fc405f153095abc42b969ef14305b963fc7c456926f23744c0c0be5f9da0a5032b2c8f") perf_event_open(0x0, r3, 0x6, 0xffffffffffffffff, 0x0) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) (async) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000080)='blkio.throttle.io_serviced\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xffffffffffffff5b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) socketpair(0x0, 0x3, 0x1, &(0x7f0000000100)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f00000002c0)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000002480)=[{&(0x7f0000000200), 0xffffffffffffffdb}, {&(0x7f0000002500)=""/214, 0xd6}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000000240)=""/101, 0x65}, {&(0x7f0000000600)=""/165, 0xe7}, {&(0x7f0000002380)=""/200, 0xc8}], 0x10000000000001b7}, 0x2102) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x26e1, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r6, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) [ 797.939550][T16660] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 797.948379][T16660] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 797.967241][T16660] batman_adv: batadv0: Interface deactivated: team0 [ 797.974051][T16660] batman_adv: batadv0: Removing interface: team0 07:27:37 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="00000000628a0000b70500030000009b34c74d0800000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 797.995345][T16660] bridge0: port 3(team0) entered blocking state [ 798.004206][T16660] bridge0: port 3(team0) entered disabled state [ 798.011257][T16660] team0: entered allmulticast mode [ 798.017019][T16660] team_slave_0: entered allmulticast mode [ 798.024461][T16660] team_slave_1: entered allmulticast mode [ 798.066543][T16660] bridge0: port 3(team0) entered blocking state [ 798.073097][T16660] bridge0: port 3(team0) entered forwarding state [ 798.093059][T16663] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 798.104927][T16663] batman_adv: batadv0: Interface deactivated: team0 07:27:37 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="00000000628a0000b70500030000009b34c74d0800000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 07:27:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 798.124599][T16663] batman_adv: batadv0: Removing interface: team0 [ 798.140899][T16668] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 07:27:37 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:37 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:37 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480f0000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:37 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x6, 0x6, 0x0, 0x0, 0x3, 0x8, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0xffffffffffffffcb, 0x8000000000000001}, 0x8024, 0x6, 0x9, 0x0, 0x3, 0x8, 0x5, 0x0, 0xf209, 0x0, 0x6}, 0x0, 0x6, r1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x58, 0x0, 0x0, 0x9, 0x0, 0x0, 0x10491, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x5, 0x4}, 0x850, 0x14af, 0x1, 0x2, 0x2, 0x7fffffff, 0x7, 0x0, 0xff, 0x0, 0x20000000000}, r0, 0x9, r1, 0x8) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="201070696473202b3c71d675d400000000000000000000aafeda176ce1082974dd3f5982118425d9b2ff01a46d16aee61bf65df340d26d1a792b2716755aa3e232a00871871d910364dcf87009f06100"/92], 0x26) 07:27:37 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="00000000628a0000b70500030000009b34c74d0800000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 798.286479][T16691] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 07:27:37 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000ee99fad3724353371c658b57649e318b5865dd2d8cc1ceac1577812ecdc153a4e5ea37d8f234c671123e8e2a792e0316213304e2d98e6808807fad75799acb5bc32fb43009d2dcd55531e4deddc67e7265f14e91b9febff1b7efaed6ffc0753e2609b6969c12d9f4cad96723088266ff0d129060ecf57378598e1cd2f2d9d2", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 798.357156][T16691] team0: left allmulticast mode [ 798.390049][T16691] team_slave_0: left allmulticast mode [ 798.408320][T16691] team_slave_1: left allmulticast mode [ 798.518459][T16691] bridge0: port 3(team0) entered disabled state [ 798.557412][T16691] batman_adv: batadv0: Adding interface: team0 [ 798.570465][T16691] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:37 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000ee99fad3724353371c658b57649e318b5865dd2d8cc1ceac1577812ecdc153a4e5ea37d8f234c671123e8e2a792e0316213304e2d98e6808807fad75799acb5bc32fb43009d2dcd55531e4deddc67e7265f14e91b9febff1b7efaed6ffc0753e2609b6969c12d9f4cad96723088266ff0d129060ecf57378598e1cd2f2d9d2", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000ee99fad3724353371c658b57649e318b5865dd2d8cc1ceac1577812ecdc153a4e5ea37d8f234c671123e8e2a792e0316213304e2d98e6808807fad75799acb5bc32fb43009d2dcd55531e4deddc67e7265f14e91b9febff1b7efaed6ffc0753e2609b6969c12d9f4cad96723088266ff0d129060ecf57378598e1cd2f2d9d2", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) [ 798.615442][T16691] batman_adv: batadv0: Interface activated: team0 [ 798.642489][T16694] batman_adv: batadv0: Adding interface: bridge0 [ 798.668045][T16694] batman_adv: batadv0: The MTU of interface bridge0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 798.704323][T16694] batman_adv: batadv0: Interface activated: bridge0 [ 798.713243][T16698] batman_adv: batadv0: Adding interface: bond0 07:27:37 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000ee99fad3724353371c658b57649e318b5865dd2d8cc1ceac1577812ecdc153a4e5ea37d8f234c671123e8e2a792e0316213304e2d98e6808807fad75799acb5bc32fb43009d2dcd55531e4deddc67e7265f14e91b9febff1b7efaed6ffc0753e2609b6969c12d9f4cad96723088266ff0d129060ecf57378598e1cd2f2d9d2", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000ee99fad3724353371c658b57649e318b5865dd2d8cc1ceac1577812ecdc153a4e5ea37d8f234c671123e8e2a792e0316213304e2d98e6808807fad75799acb5bc32fb43009d2dcd55531e4deddc67e7265f14e91b9febff1b7efaed6ffc0753e2609b6969c12d9f4cad96723088266ff0d129060ecf57378598e1cd2f2d9d2", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) [ 798.727378][T16698] batman_adv: batadv0: The MTU of interface bond0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:27:37 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:37 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848110000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) [ 798.793941][T16698] batman_adv: batadv0: Interface activated: bond0 [ 798.802931][T16703] batman_adv: batadv0: Interface deactivated: team0 [ 798.813039][T16703] batman_adv: batadv0: Removing interface: team0 [ 798.840329][T16703] bridge0: port 3(team0) entered blocking state [ 798.858629][T16703] bridge0: port 3(team0) entered disabled state [ 798.874604][T16703] team0: entered allmulticast mode [ 798.889460][T16703] team_slave_0: entered allmulticast mode [ 798.895370][T16703] team_slave_1: entered allmulticast mode [ 798.931067][T16703] bridge0: port 3(team0) entered blocking state [ 798.937668][T16703] bridge0: port 3(team0) entered forwarding state [ 799.004849][T16721] ================================================================== [ 799.012980][T16721] BUG: KASAN: slab-out-of-bounds in dsa_user_changeupper+0x61a/0x6e0 [ 799.021113][T16721] Read of size 8 at addr ffff88807cce6c90 by task syz-executor.5/16721 [ 799.029391][T16721] [ 799.031741][T16721] CPU: 0 PID: 16721 Comm: syz-executor.5 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0 [ 799.041966][T16721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 799.052064][T16721] Call Trace: [ 799.055385][T16721] [ 799.058355][T16721] dump_stack_lvl+0xd9/0x1b0 [ 799.063026][T16721] print_report+0xc4/0x620 [ 799.067493][T16721] ? __virt_addr_valid+0x5e/0x580 [ 799.072582][T16721] ? __phys_addr+0xc6/0x140 [ 799.077159][T16721] kasan_report+0xda/0x110 [ 799.081643][T16721] ? dsa_user_changeupper+0x61a/0x6e0 [ 799.087088][T16721] ? dsa_user_changeupper+0x61a/0x6e0 [ 799.092542][T16721] dsa_user_changeupper+0x61a/0x6e0 [ 799.097829][T16721] dsa_user_netdevice_event+0xd04/0x3480 [ 799.103549][T16721] ? dsa_user_change_conduit+0x7e0/0x7e0 [ 799.109262][T16721] ? kcov_close+0x20/0x20 [ 799.113654][T16721] ? br_device_event+0x245/0x910 [ 799.118660][T16721] ? br_switchdev_event+0x5b0/0x5b0 [ 799.123933][T16721] ? packet_notifier+0x1b7/0x8c0 [ 799.128936][T16721] notifier_call_chain+0xb6/0x3b0 [ 799.134028][T16721] ? dsa_user_change_conduit+0x7e0/0x7e0 [ 799.139842][T16721] call_netdevice_notifiers_info+0xbe/0x130 [ 799.146080][T16721] __netdev_upper_dev_link+0x439/0x850 [ 799.151613][T16721] ? __dev_change_net_namespace+0x12f0/0x12f0 [ 799.157761][T16721] ? rcu_is_watching+0x12/0xb0 [ 799.162590][T16721] ? ref_tracker_free+0x810/0x810 [ 799.167680][T16721] ? batadv_hardif_get_by_netdev+0x262/0x420 [ 799.173722][T16721] netdev_master_upper_dev_link+0xa0/0xd0 [ 799.179516][T16721] ? netdev_upper_dev_link+0xc0/0xc0 [ 799.184877][T16721] ? batadv_hardif_get_by_netdev+0x267/0x420 [ 799.190588][ T28] audit: type=1800 audit(1705735658.272:20): pid=16704 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=1965 res=0 errno=0 [ 799.190891][T16721] batadv_hardif_enable_interface+0x28a/0xd20 [ 799.217737][T16721] batadv_softif_slave_add+0xee/0x130 [ 799.223177][T16721] ? batadv_softif_slave_del+0x130/0x130 [ 799.228872][T16721] do_set_master+0x1b5/0x220 [ 799.233577][T16721] do_setlink+0xa4a/0x4090 [ 799.238048][T16721] ? rtnl_bridge_getlink+0x8c0/0x8c0 [ 799.243470][T16721] ? rcu_is_watching+0x12/0xb0 [ 799.248287][T16721] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 799.254451][T16721] ? _raw_spin_unlock_irqrestore+0x3b/0x70 [ 799.260328][T16721] ? ___ratelimit+0x24c/0x570 [ 799.265127][T16721] ? rcu_is_watching+0x12/0xb0 [ 799.269976][T16721] ? idr_get_free+0xa30/0xa30 [ 799.274750][T16721] ? lock_release+0x4bf/0x690 [ 799.279488][T16721] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 799.285443][T16721] ? __nla_validate_parse+0x615/0x28b0 [ 799.290965][T16721] ? irqentry_enter+0x2d/0x50 [ 799.295784][T16721] ? rcu_is_watching+0x12/0xb0 [ 799.300698][T16721] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 799.306862][T16721] ? __rtnl_newlink+0xab1/0x1940 [ 799.311869][T16721] __rtnl_newlink+0xc28/0x1940 [ 799.316709][T16721] ? rtnl_link_unregister+0x260/0x260 [ 799.322198][T16721] rtnl_newlink+0x67/0xa0 [ 799.326675][T16721] ? __rtnl_newlink+0x1940/0x1940 [ 799.331768][T16721] rtnetlink_rcv_msg+0x3c7/0xe00 [ 799.336781][T16721] ? rtnl_fill_vf+0x490/0x490 [ 799.341561][T16721] netlink_rcv_skb+0x16b/0x440 [ 799.346653][T16721] ? rtnl_fill_vf+0x490/0x490 [ 799.351387][T16721] ? netlink_ack+0x1380/0x1380 [ 799.356255][T16721] ? netlink_deliver_tap+0x1a0/0xd00 [ 799.361625][T16721] netlink_unicast+0x53b/0x810 [ 799.366461][T16721] ? netlink_attachskb+0x880/0x880 [ 799.371633][T16721] ? __phys_addr_symbol+0x30/0x70 [ 799.376713][T16721] ? __check_object_size+0x323/0x730 [ 799.382064][T16721] netlink_sendmsg+0x8b7/0xd70 [ 799.386890][T16721] ? netlink_unicast+0x810/0x810 [ 799.391889][T16721] ? bpf_lsm_socket_accept+0x10/0x10 [ 799.397243][T16721] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 799.402596][T16721] ? netlink_unicast+0x810/0x810 [ 799.407595][T16721] __sock_sendmsg+0xd5/0x180 [ 799.412257][T16721] ____sys_sendmsg+0x6ac/0x940 [ 799.417093][T16721] ? copy_msghdr_from_user+0x10b/0x160 [ 799.422610][T16721] ? kernel_sendmsg+0x50/0x50 [ 799.427357][T16721] ? ctx_sched_in+0x296/0x6a0 [ 799.432110][T16721] ? rcu_is_watching+0x12/0xb0 [ 799.437015][T16721] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 799.443069][T16721] ___sys_sendmsg+0x135/0x1d0 [ 799.447805][T16721] ? do_recvmmsg+0x740/0x740 [ 799.452453][T16721] ? rcu_is_watching+0x12/0xb0 [ 799.457295][T16721] ? __fget_light+0x173/0x200 [ 799.462037][T16721] __sys_sendmsg+0x117/0x1e0 [ 799.466684][T16721] ? __sys_sendmsg_sock+0x30/0x30 [ 799.471756][T16721] ? irqentry_enter+0x2d/0x50 [ 799.476495][T16721] do_syscall_64+0xd3/0x250 [ 799.481060][T16721] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 799.487003][T16721] RIP: 0033:0x7fb0dea7cda9 [ 799.491459][T16721] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 799.511117][T16721] RSP: 002b:00007fb0df89e0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 799.519584][T16721] RAX: ffffffffffffffda RBX: 00007fb0debabf80 RCX: 00007fb0dea7cda9 [ 799.527601][T16721] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 799.535615][T16721] RBP: 00007fb0deac947a R08: 0000000000000000 R09: 0000000000000000 [ 799.543626][T16721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 799.551635][T16721] R13: 000000000000000b R14: 00007fb0debabf80 R15: 00007ffea17a9d98 [ 799.559663][T16721] [ 799.562710][T16721] [ 799.565056][T16721] Allocated by task 6559: [ 799.569404][T16721] kasan_save_stack+0x33/0x50 [ 799.574125][T16721] kasan_save_track+0x14/0x30 [ 799.579021][T16721] __kasan_kmalloc+0xa2/0xb0 [ 799.583649][T16721] __kmalloc_node+0x21b/0x460 [ 799.588376][T16721] kvmalloc_node+0x99/0x1a0 [ 799.592951][T16721] alloc_netdev_mqs+0xb3/0x12a0 [ 799.597853][T16721] rtnl_create_link+0xc82/0xfb0 [ 799.602853][T16721] __rtnl_newlink+0x10a1/0x1940 [ 799.607755][T16721] rtnl_newlink+0x67/0xa0 [ 799.612220][T16721] rtnetlink_rcv_msg+0x3c7/0xe00 [ 799.617201][T16721] netlink_rcv_skb+0x16b/0x440 [ 799.622015][T16721] netlink_unicast+0x53b/0x810 [ 799.626829][T16721] netlink_sendmsg+0x8b7/0xd70 [ 799.631644][T16721] __sock_sendmsg+0xd5/0x180 [ 799.636302][T16721] __sys_sendto+0x225/0x310 [ 799.640843][T16721] __x64_sys_sendto+0xe0/0x1b0 [ 799.645735][T16721] do_syscall_64+0xd3/0x250 [ 799.650295][T16721] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 799.656233][T16721] [ 799.658591][T16721] The buggy address belongs to the object at ffff88807cce6000 [ 799.658591][T16721] which belongs to the cache kmalloc-cg-4k of size 4096 [ 799.672947][T16721] The buggy address is located 3216 bytes inside of [ 799.672947][T16721] allocated 3223-byte region [ffff88807cce6000, ffff88807cce6c97) [ 799.687308][T16721] [ 799.689663][T16721] The buggy address belongs to the physical page: [ 799.696103][T16721] page:ffffea0001f33800 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88807cce2000 pfn:0x7cce0 [ 799.707696][T16721] head:ffffea0001f33800 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 799.716670][T16721] memcg:ffff88801f276981 [ 799.720939][T16721] flags: 0xfff00000000a40(workingset|slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 799.729939][T16721] page_type: 0xffffffff() [ 799.734313][T16721] raw: 00fff00000000a40 ffff88801304f500 ffffea0000c2ac10 ffffea0000b82e10 [ 799.742961][T16721] raw: ffff88807cce2000 0000000000040003 00000001ffffffff ffff88801f276981 [ 799.751591][T16721] page dumped because: kasan: bad access detected [ 799.758043][T16721] page_owner tracks the page as allocated [ 799.763789][T16721] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 5743, tgid 5733 (syz-executor.5), ts 258952627375, free_ts 258919097709 [ 799.787046][T16721] post_alloc_hook+0x2d0/0x350 [ 799.791885][T16721] get_page_from_freelist+0xa28/0x3780 [ 799.797407][T16721] __alloc_pages+0x22f/0x2440 [ 799.802130][T16721] new_slab+0xcc/0x3a0 07:27:38 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500004e9500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 07:27:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0xfec7, 0x7e, 0x2, 0x0, 0x0, 0x0, 0x800000, 0xc8a40, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000017c0), 0x7}, 0x0, 0xbe, 0x2, 0x6, 0x8, 0xffffffff, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) bpf$ITER_CREATE(0x21, &(0x7f0000001780)={r0}, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x221a, 0x0, 0x7f, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000001c0), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x33, 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="180000000807000000000000004400009500000000000000fec82ca0c1fafa884b61e4bc7a6fac76d3977e7bb24566f84bf50c96a2b535fdcbe63ab6e3086d6feaafa55405f4be000000000000000000000000000000000000000000ead16e7df1d3deb3514233506be900ef198d7095ca2c9f3f56eb7cc6f3fcdb3882b0bc3565221ebf063e3f0463ea29ba13cf6a1a88b68724e0e4ca2a1bf2e09af7cab50800000000000000cd025e814ce456b17171d569e60d2700"/196], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x29, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x9, 0x2, 0x40}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[0xffffffffffffffff]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x9, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000880), 0x18, 0x10, &(0x7f0000000d00), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100), 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x7, &(0x7f0000001b80)=ANY=[@ANYRESHEX, @ANYRES32=r7, @ANYBLOB='\x00', @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x401, 0xda, &(0x7f00000005c0)=""/218, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x10, 0x22, 0xffff}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0xfffffffe}, r9, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 07:27:38 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xee, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x40008}, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2fba5aaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x75, 0x4, 0x81, 0xa8, 0x0, 0x10001, 0x80041, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_bp={&(0x7f00000008c0)}, 0x260d, 0x493f, 0x4, 0x9, 0x8, 0x10001, 0x6, 0x0, 0x8ef, 0x0, 0x1000}, 0x0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000b40)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="9d004800180000003500003a7c7bd52cd808000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r4}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x0, 0xfffffffffffffebb, 0x0, 0x10000002, 0x20801}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0xfffffff8, 0x5, 0x6, 0x200a, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0185879, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0xa, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r3, @ANYRES8=r6, @ANYBLOB="90300372e7b900534147c7156e3873d1bf0677c02f985a3201bf"], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x1, 0x4}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000e8bc17ffffeebce71d1774"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x6}, 0x10}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x8) socketpair(0x1d, 0x1, 0x8000007, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x0, 0x18}, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x20, 0x6, 0x78, 0x3, 0x0, 0x400000000000000, 0x40a10, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40000002, 0x1, @perf_config_ext={0x1ff, 0x8}, 0x8c508, 0x0, 0x4, 0x3, 0x0, 0x800006, 0x0, 0x0, 0xffffffff, 0x0, 0x480000000006}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0xe, 0xf7, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x294, 0x0, 0x8, 0x8, 0x3, 0x7, 0xca, 0x0, 0x9, 0x0, 0x7fffffffffffffff}, r0, 0xa, r8, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2840c0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 07:27:38 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) (async, rerun: 64) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x6, 0x6, 0x0, 0x0, 0x3, 0x8, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0xffffffffffffffcb, 0x8000000000000001}, 0x8024, 0x6, 0x9, 0x0, 0x3, 0x8, 0x5, 0x0, 0xf209, 0x0, 0x6}, 0x0, 0x6, r1, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) (async, rerun: 32) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (rerun: 32) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x58, 0x0, 0x0, 0x9, 0x0, 0x0, 0x10491, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x5, 0x4}, 0x850, 0x14af, 0x1, 0x2, 0x2, 0x7fffffff, 0x7, 0x0, 0xff, 0x0, 0x20000000000}, r0, 0x9, r1, 0x8) (async) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="201070696473202b3c71d675d400000000000000000000aafeda176ce1082974dd3f5982118425d9b2ff01a46d16aee61bf65df340d26d1a792b2716755aa3e232a00871871d910364dcf87009f06100"/92], 0x26) [ 799.806275][T16721] ___slab_alloc+0x4af/0x19a0 [ 799.811013][T16721] __slab_alloc.constprop.0+0x56/0xa0 [ 799.816458][T16721] __kmalloc_node_track_caller+0x35b/0x460 [ 799.822415][T16721] kmemdup+0x29/0x60 [ 799.826371][T16721] __addrconf_sysctl_register+0xc2/0x3f0 [ 799.832064][T16721] addrconf_sysctl_register+0x153/0x1e0 [ 799.837669][T16721] ipv6_add_dev+0x9f8/0x13d0 [ 799.842312][T16721] addrconf_notify+0x542/0x18f0 [ 799.847224][T16721] notifier_call_chain+0xb6/0x3b0 [ 799.852323][T16721] call_netdevice_notifiers_info+0xbe/0x130 [ 799.858294][T16721] register_netdevice+0x16e2/0x1da0 [ 799.863548][T16721] register_netdev+0x2f/0x50 [ 799.868291][T16721] page last free pid 5743 tgid 5733 stack trace: [ 799.874652][T16721] free_unref_page_prepare+0x51f/0xb10 [ 799.880184][T16721] free_unref_page+0x33/0x3c0 [ 799.884927][T16721] __put_partials+0x14c/0x160 [ 799.889667][T16721] qlist_free_all+0x58/0x150 [ 799.894311][T16721] kasan_quarantine_reduce+0x18e/0x1d0 [ 799.899833][T16721] __kasan_slab_alloc+0x65/0x90 [ 799.904736][T16721] __kmalloc+0x1bd/0x440 07:27:39 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500004e9500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 799.909034][T16721] ops_init+0x16b/0x650 [ 799.913243][T16721] setup_net+0x422/0xa40 [ 799.917543][T16721] copy_net_ns+0x2f1/0x660 [ 799.922023][T16721] create_new_namespaces+0x3ea/0xb10 [ 799.927370][T16721] copy_namespaces+0x464/0x560 [ 799.932203][T16721] copy_process+0x335d/0x97b0 [ 799.936939][T16721] kernel_clone+0xfd/0x930 [ 799.941415][T16721] __do_sys_clone+0xba/0x100 [ 799.946068][T16721] do_syscall_64+0xd3/0x250 [ 799.950634][T16721] [ 799.952994][T16721] Memory state around the buggy address: [ 799.958659][T16721] ffff88807cce6b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 799.966768][T16721] ffff88807cce6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 799.974882][T16721] >ffff88807cce6c80: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 799.982987][T16721] ^ [ 799.987618][T16721] ffff88807cce6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 799.995867][T16721] ffff88807cce6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 07:27:39 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x6, 0x6, 0x0, 0x0, 0x3, 0x8, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0xffffffffffffffcb, 0x8000000000000001}, 0x8024, 0x6, 0x9, 0x0, 0x3, 0x8, 0x5, 0x0, 0xf209, 0x0, 0x6}, 0x0, 0x6, r1, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x58, 0x0, 0x0, 0x9, 0x0, 0x0, 0x10491, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x5, 0x4}, 0x850, 0x14af, 0x1, 0x2, 0x2, 0x7fffffff, 0x7, 0x0, 0xff, 0x0, 0x20000000000}, r0, 0x9, r1, 0x8) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="201070696473202b3c71d675d400000000000000000000aafeda176ce1082974dd3f5982118425d9b2ff01a46d16aee61bf65df340d26d1a792b2716755aa3e232a00871871d910364dcf87009f06100"/92], 0x26) [ 800.003973][T16721] ================================================================== 07:27:39 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r0}, &(0x7f00000000c0), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500004e9500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x10, 0x10, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\t\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) [ 800.062953][T16721] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 800.070223][T16721] CPU: 0 PID: 16721 Comm: syz-executor.5 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0 [ 800.080521][T16721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 800.090626][T16721] Call Trace: [ 800.093947][T16721] [ 800.096920][T16721] dump_stack_lvl+0xd9/0x1b0 [ 800.101594][T16721] panic+0x6dc/0x790 [ 800.105568][T16721] ? panic_smp_self_stop+0xa0/0xa0 [ 800.110997][T16721] ? rcu_is_watching+0x12/0xb0 [ 800.115839][T16721] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 800.121912][T16721] ? preempt_schedule_thunk+0x1a/0x30 [ 800.127381][T16721] ? preempt_schedule_common+0x45/0xc0 [ 800.132932][T16721] check_panic_on_warn+0xab/0xb0 [ 800.137942][T16721] end_report+0x108/0x150 [ 800.142333][T16721] kasan_report+0xea/0x110 [ 800.146806][T16721] ? dsa_user_changeupper+0x61a/0x6e0 [ 800.153644][T16721] ? dsa_user_changeupper+0x61a/0x6e0 [ 800.159100][T16721] dsa_user_changeupper+0x61a/0x6e0 [ 800.164464][T16721] dsa_user_netdevice_event+0xd04/0x3480 [ 800.170173][T16721] ? dsa_user_change_conduit+0x7e0/0x7e0 [ 800.175854][T16721] ? kcov_close+0x20/0x20 [ 800.180219][T16721] ? br_device_event+0x245/0x910 [ 800.185187][T16721] ? br_switchdev_event+0x5b0/0x5b0 [ 800.190424][T16721] ? packet_notifier+0x1b7/0x8c0 [ 800.195391][T16721] notifier_call_chain+0xb6/0x3b0 [ 800.200454][T16721] ? dsa_user_change_conduit+0x7e0/0x7e0 [ 800.206131][T16721] call_netdevice_notifiers_info+0xbe/0x130 [ 800.212067][T16721] __netdev_upper_dev_link+0x439/0x850 [ 800.217570][T16721] ? __dev_change_net_namespace+0x12f0/0x12f0 [ 800.223682][T16721] ? rcu_is_watching+0x12/0xb0 [ 800.228477][T16721] ? ref_tracker_free+0x810/0x810 [ 800.233537][T16721] ? batadv_hardif_get_by_netdev+0x262/0x420 [ 800.239547][T16721] netdev_master_upper_dev_link+0xa0/0xd0 [ 800.245393][T16721] ? netdev_upper_dev_link+0xc0/0xc0 [ 800.250716][T16721] ? batadv_hardif_get_by_netdev+0x267/0x420 [ 800.256721][T16721] batadv_hardif_enable_interface+0x28a/0xd20 [ 800.262821][T16721] batadv_softif_slave_add+0xee/0x130 [ 800.268233][T16721] ? batadv_softif_slave_del+0x130/0x130 [ 800.274081][T16721] do_set_master+0x1b5/0x220 [ 800.278711][T16721] do_setlink+0xa4a/0x4090 [ 800.283153][T16721] ? rtnl_bridge_getlink+0x8c0/0x8c0 [ 800.288463][T16721] ? rcu_is_watching+0x12/0xb0 [ 800.293256][T16721] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 800.299279][T16721] ? _raw_spin_unlock_irqrestore+0x3b/0x70 [ 800.305201][T16721] ? ___ratelimit+0x24c/0x570 [ 800.309911][T16721] ? rcu_is_watching+0x12/0xb0 [ 800.314705][T16721] ? idr_get_free+0xa30/0xa30 [ 800.319415][T16721] ? lock_release+0x4bf/0x690 [ 800.324195][T16721] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 800.330127][T16721] ? __nla_validate_parse+0x615/0x28b0 [ 800.335627][T16721] ? irqentry_enter+0x2d/0x50 [ 800.340327][T16721] ? rcu_is_watching+0x12/0xb0 [ 800.345128][T16721] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 800.351152][T16721] ? __rtnl_newlink+0xab1/0x1940 [ 800.356113][T16721] __rtnl_newlink+0xc28/0x1940 [ 800.360906][T16721] ? rtnl_link_unregister+0x260/0x260 [ 800.366322][T16721] rtnl_newlink+0x67/0xa0 [ 800.370678][T16721] ? __rtnl_newlink+0x1940/0x1940 [ 800.375728][T16721] rtnetlink_rcv_msg+0x3c7/0xe00 [ 800.380693][T16721] ? rtnl_fill_vf+0x490/0x490 [ 800.385402][T16721] netlink_rcv_skb+0x16b/0x440 [ 800.390200][T16721] ? rtnl_fill_vf+0x490/0x490 [ 800.394903][T16721] ? netlink_ack+0x1380/0x1380 [ 800.399706][T16721] ? netlink_deliver_tap+0x1a0/0xd00 [ 800.405031][T16721] netlink_unicast+0x53b/0x810 [ 800.409828][T16721] ? netlink_attachskb+0x880/0x880 [ 800.414975][T16721] ? __phys_addr_symbol+0x30/0x70 [ 800.420040][T16721] ? __check_object_size+0x323/0x730 [ 800.425365][T16721] netlink_sendmsg+0x8b7/0xd70 [ 800.430161][T16721] ? netlink_unicast+0x810/0x810 [ 800.435132][T16721] ? bpf_lsm_socket_accept+0x10/0x10 [ 800.440539][T16721] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 800.445864][T16721] ? netlink_unicast+0x810/0x810 [ 800.450835][T16721] __sock_sendmsg+0xd5/0x180 [ 800.455467][T16721] ____sys_sendmsg+0x6ac/0x940 [ 800.460281][T16721] ? copy_msghdr_from_user+0x10b/0x160 [ 800.465942][T16721] ? kernel_sendmsg+0x50/0x50 [ 800.470671][T16721] ? ctx_sched_in+0x296/0x6a0 [ 800.475389][T16721] ? rcu_is_watching+0x12/0xb0 [ 800.480184][T16721] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 800.486210][T16721] ___sys_sendmsg+0x135/0x1d0 [ 800.490917][T16721] ? do_recvmmsg+0x740/0x740 [ 800.495542][T16721] ? rcu_is_watching+0x12/0xb0 [ 800.500358][T16721] ? __fget_light+0x173/0x200 [ 800.505066][T16721] __sys_sendmsg+0x117/0x1e0 [ 800.509683][T16721] ? __sys_sendmsg_sock+0x30/0x30 [ 800.514731][T16721] ? irqentry_enter+0x2d/0x50 [ 800.519446][T16721] do_syscall_64+0xd3/0x250 [ 800.524159][T16721] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 800.530082][T16721] RIP: 0033:0x7fb0dea7cda9 [ 800.534516][T16721] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 800.554154][T16721] RSP: 002b:00007fb0df89e0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 800.562591][T16721] RAX: ffffffffffffffda RBX: 00007fb0debabf80 RCX: 00007fb0dea7cda9 [ 800.570677][T16721] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 800.578676][T16721] RBP: 00007fb0deac947a R08: 0000000000000000 R09: 0000000000000000 [ 800.586664][T16721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 800.594654][T16721] R13: 000000000000000b R14: 00007fb0debabf80 R15: 00007ffea17a9d98 [ 800.602655][T16721] [ 800.605920][T16721] Kernel Offset: disabled [ 800.610262][T16721] Rebooting in 86400 seconds..