89351][ T2640] team0 (unregistering): Port device team_slave_1 removed [ 962.999648][ T2640] team0 (unregistering): Port device team_slave_0 removed [ 963.010555][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 963.046289][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 963.104597][ T2640] bond0 (unregistering): Released all slaves [ 963.189359][ T6232] device veth1_vlan entered promiscuous mode [ 963.197199][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 963.214172][ T6231] device veth1_vlan entered promiscuous mode [ 963.222460][ T6234] device veth1_vlan entered promiscuous mode [ 963.350753][ T6298] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:38:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a1000007ae3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:38:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) sendmmsg$inet(r0, &(0x7f0000008c80)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000140)="e31b0ade652bbd1c0a742f712abc829eb8a4099261c10ea6bdb32b06fb7bd6f9e21e0ee297e013c7b7f84a1f01eaf4c9a050686d989155d9de777f0fe0c5b55ea039ab7f99c7923d9e22817f0b79cc8e205f6f9df6c4a0d900bbdf644cb5b28e76711da928a48e1d5347d3ac45", 0x6d}, {&(0x7f00000002c0)="bdcc816463ff65ba953c023d34e6dae6c08bf3f4ba7946443f7007f231a6edd0dd5447183e2293c0c95e6c93c20a9d38d7eb335e5db95ea1d7988e8ce1fc4e9cc4a1cd06cb48156764fc8e22bb30f3d9f1a26dab0db52b1f595a5516bab66044121c496e338fbbee62c33916e3ffc6520e01c140d65e0657d9b310105a6055fdf09f30874d52d5bc17125763426ffb698070ca64579ba466ee5dac6defbd879d9a6316b1335679eae9cc3f49b271097ec04329b818898f1dc6913fff825367a4478b93e7de77c5", 0xc7}, {&(0x7f0000000040)="decb72915b6c7cc2ab712945e5bab09a5d9e741f15081b762cb2af6c24adc8a5d54436e5e4075eb7816fd1284f45cbc7d3f42526dc8b05eadc2830", 0x3b}, {&(0x7f00000001c0)="83b3df1ed1257626982e73ba268bfe7989c30409fc0db7ff8cd67b3501704c5e02b987d9c389e02c995c98628cf1f8c9ac11dc7d7d938de91af0839b80ad09458d3d428ea63096d7ac6fbfcc12c3ead5764796f36993b18f3bf72dc13a1507fefa744cf3f27ea106d169d3d80f26dbf902", 0x71}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f00000003c0)="131500a017e9f471a520f26115b7131a6e5b25625e6a03cca52c3400018a952036d7dc2128dcb4336c6faae1824ef866100528573b2df6be1ae2d2393ad7994f0f28a0d55d69f39bd2b153e176982c65c5e92598b0e96e7f7ec609ed08c7e4080b097c4e1a9b35e3", 0x68}, {&(0x7f0000000480)="7e7f0bd706f56100fa9d25dccdbcc1886abb4425f9663cc0f83ccf8781d450b4e3b737ed556a25562a90bf23b67e00d6f258f770d19db46fd6c3c05864f313af1eb2fd8fd93f7dd4b76910769cf29d1ec4ba62a473336b0dba86c5d5d0dc49d03b2080993ee6a63e34fc26d96afaf9c3a549e7cc4d96", 0x76}, {&(0x7f0000000500)="b37ef511a1d7d6cd447fc0ab4f4db4631888d3e39fe9c24189e455447e6900319e509ec056d7ec3cae37d426aeadd7fa453b67ff74f399e27eae6acb41bc757fff32a7918d4ccffbfc223a7c4868f8dd4fe6911f9e6eef91995c9cff3d34c6b962a8f8", 0x63}], 0x8, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x68}}, {{&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x4}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000000680)="183af2bdb07a1b9717efc8dd22ba46eb20ddd60bdffead4325b5afd710f6b26e61a1be2983741df7391b243eb9c14b0b199df035ab9ea764685a6db9b97ed0cb5dfd6f589bdf6543dcabffd85dee3569b847241c04b9b5d8c3deec6e33f4d4a3fa6529eb61c93e8fbb0bd7636a490dc7e17f2cbde304d8a4001121a3d7a39a095e6a2102be40588cbef9a0a892a359f05af8644d3b534a930424e7431b13b658e63907f2d53826d7237c6f94c8cdefd231cbde9786b7c9650ab17b7e10f480e833998c8d0e72bc432cd31a4b8405daedfddd912d4b53e42869e4c45b13dd5e", 0xdf}, {&(0x7f0000000780)="9a34c82f4ad6009b0f93fd888db18214f8cf72dc13c37b214b545177150e8e4fb7b6b8801c85f5a7227e638c7e51de26d8f3ce63c9371640149bf76f58db5cd8dc7d86b5f122a4c9212ba3ebe9442ffebba99629834a9d2afa77b3334f2d803bc896717e35d28ebcc188f2cb6f449a351b8c7c4111f7666e85b0691b322682244ed051a2291ed4bbd42c52b212e594285a8fc83cd6d97dfd593a0df27b04bd14e6eb3ba0b6059ced551fa922fc7f", 0xae}, {&(0x7f0000000840)="1de999bfc5f5aa70", 0x8}, {&(0x7f0000000880)="373104ae7e954bd5204260500aeed16c1f9329f6a215c4256ebd0db4a3e20c019546bd9d487a6180a77fbc22b9aa762e47f05ccc39ffefb3a171a33a571fff37d11818a4c6f5976ae66cc834de929a082bafc4682449893ae8faca2a32b2736d1d2342861d4a753a33b56bd8f0622213e7e568244f681a681645c7d964639854006f0e42364d927a6a20b24064435bfa071bf7d80cf27a5f5469802590f81144e18a7308c09be74e93a1f0c648d70b94213b2abd252f1f863d189894ace989e9aa877e8cf3cb0798d928e72f4ca76baf075203582f2d", 0xd6}, {&(0x7f0000000980)="4fd38492e522042074865251dd03e5330ff5a23b12fb58fd94a2ae49918ae3041f6009a60e9d79ed597c3219a4fd4edd9b70f483cd51723ff07828ca834f00ade4214dbe3ee2a50f1af852e104de03b429c8e4170e2b1ac876c5e95a2b7f3a25a891dec5914e1138a55a7ecef73f48405f6b44e2eac259272c107cf20248e1fdea91af77f9a6516012e8cc5bf982b0120c7739bffa80623f4fef211ea3023e9f3e67e7560056a2fc1a7ef4b15edbd6ac4219e225e8697341fe4d9f6f82a076a2d304769c7821b92ef4ca920cd522c53655048fb98d809ff5649e6bd83378fb110ec33c1a9a", 0xe5}, {&(0x7f0000001ac0)="af8ae174deaf3c0b32c0bb120f76073a89ae5680c12fd1cfef69fbcb4417c48b642bdfd6b6e3c0218a18f4af35d00c48507242fbe8078730d03af019ef464a857ed06b45bb10c0b693db229198da0cbe878f98be95e50f46430af5a5ece98399c114c7f91c25791f819ff67911f0f58ba44253e1aa40b4dc3227221e2500a71e868babd495cb363fc195e6fd6eb34a91fa66639bb891fe0d3509dba71fc0fa8a2bda8f", 0xa3}], 0x6}}, {{&(0x7f0000001c00)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001c40)="f06d20c01b1ccbfc15a8fcec379c8024aabe5c612192cd2f9e9259e6b8f4", 0x1e}], 0x1, &(0x7f0000008e00)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x6e, 0x1, 0xf, [{@remote, 0x8}, {@loopback, 0x12a}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}]}, @timestamp={0x44, 0x20, 0x45, 0x0, 0x0, [0x3, 0x1, 0x2440, 0x80008000, 0x6, 0x7, 0x1]}, @noop, @timestamp={0x44, 0x1c, 0xc6, 0x0, 0x4, [0x7, 0x200, 0x7, 0x8, 0x2, 0x800]}, @cipso={0x86, 0xc, 0x2, [{0x2, 0x6, "9c1a44f4"}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x24, 0x18, 0x3, 0x4, [{@remote, 0x1}, {@loopback, 0x8001}, {@local, 0x6}, {@multicast1, 0x1}]}, @generic={0x82, 0xe, "a4ac0724a6c074274eefa0e7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x100}}, {{&(0x7f0000001dc0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002300)=[{&(0x7f0000001e00)="9be8a0a30e2c7f0799076e9a7e2a8da9f89200ea0354a513613d854d46abfada81ef75e0dcdcea8ec023d31a3604d72948e5c48c6ee546621bba49524f3a27b2e0df6744edd7b5b033e952dcb4945f5bc47d47679cd69416dde8ea71751b7fdcb088e15f51bfb8e75e462216373a3f31c28e3aedb2590a5eb88c0cea19643db3f6dfaa51850086372665f3089bb5310d881fa674c4e83a674589de6df6f8cc4660e06d13aa14490df4164d8c2e3168366d606f163427306656df48a8ec5db21d164527171092b0d44aa14c81990a3a988122bc0d439394449497feaea1293e9bb5d42755017cf1fbd7893e95e1e7b567aca85e61", 0xf4}, {&(0x7f0000001f80)="7c386cc044fec1ee527b64047c0c2c7a904e1f2f6231c15cd5cfa7a62833a6eb15eda84db2a474cf7a937b2bc2ffca4ec238da5d07ed3c250bca767a192330bd94ce74ff06415823fc29ef044b171abadc2e52fa0ae8353896652a7061aa50726e4232f787e6903b7f1cbf0872422ce9d1ee460d49ad11b9c942766c6a68dba1d8064fb442d652570b2dd73736d9e9f58a82624a694c3af60ae3947103383df42749a3ae43850db6562dc3aa0017d87c4154cc6d4a75d90203c6ad49617098f0df1dfed54e0c657495300c22a701efdc7ed40390c58f9ffcefcb4c4b33eceadc401b10231f8dbe29e6fdf89a05d92838a77f", 0xf2}, {&(0x7f0000002080)="df6f6964d9d4b4aa92384e41120fb3e0458ad476e15e3e1aba0f32d6b3d295e1dc818913d6e3eab4b802c7ded19cf87e8abacd7757533ce33cb50bb243abe07b25fb12e0168451c8dd44bf17de44a34f0d1f17c221dce08c10b761a2254339d1dba48d3e7a272cc680ec571955fea79ad5242ad37e05ce7e8e29580c75b1cc75", 0x80}, {&(0x7f0000001f00)="33121daa0cc7e73f4b0f739453f4a7ec3bb8b8564947526a61fbda69ea47ae7b9ff1f264a61c204c1145cbb49aa373ecd6e94ad85edaedee2811", 0x3a}, {&(0x7f0000002100)="d7e5697bd4752b47d7abee5a2a3f3de365f5b6b28ba70d9a2029804f263f150d884c9736246af9d4000c4d950ae1eeaa29cc53f2ce759dd034722203a60f18bfd5beccb105a36c5eed138f7d315e9b8079abb5c94547e75ebfdc4542575f9ce112aec0", 0x63}, {&(0x7f0000002180)="757241eb7689b5fb7a813f8e9e9f58fefbfa4669d7127f1e1d9188c5524e9a13617f77d1f99f4a415a82a56496c7b43eda5244ce4097a01cd98537c386c36a803ebce00334990ee6873793c9f608a27e", 0x50}, {&(0x7f0000002200)="fa7da6398560d85c31faf97b252e01257a3e45b4c36471e982eecdaf3edfa9d715a978266c7b818f1ab2b6b133d1797904e739d6fbe0ab436baaa58ff63d7bc0d6fd7a633fd59dcfdb0952015aac82af4d5c315b082366f31364853adde76d73c07ddda03788eaf41fbef929f8127576c201869edb82eb5fdf57c50e5ba1d3bef696d0f7554a3ae41fd736873f79d50e29996ba654529dcc8c15f974b0a483376a55e4499ea8105a7bae7c778fa858f7b0bc63402dada9478643f14ef9f877621e694b8c46c009213b7d6aeba332e7e423aaf322a33eab4fb1ab504635183aa7af7979cdd3c239f10ec9709b69e96d8b921052", 0xf3}], 0x7, &(0x7f0000002380)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}}}}], 0x68}}, {{&(0x7f0000002400)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002780)=[{&(0x7f0000002440)="550e0938c5c0f50e1483a6a392f017c7d05022832f5a26ef75d1408ab3107817f67cb8cc868c51586ce98e17b1d59d33928139ec381939a9a32d73ec858d593ec29fc410f48011e6262b148e8df06bb8ee38befbe1d5073a33037b2421badfb3657cb789fd6ca39f1088390976a11ead797e41021f748647abe35320535de8f493b8f17697dcfe3cf66a9ba38f8737b8c061ef6b259223a1009975da6da852b029ec0423e474dd1c659418e7b05195382c05b285e3d4457604", 0xb9}, {&(0x7f0000002500)="041eb6e0f6ee6080b78751b0876d7fa3050f2eec2ed35957295e59a3a9316eae03457506221122265b71d57f7367cab94c0fbc1e012983ee4fd14e5977d52ae6052f58718c9dc94daea60fdc6fafea0e38157f73b878f154443fec514ccdc711", 0x60}, {&(0x7f0000002580)="622dd9b38709b3858d808865558770be9203ec256e4e1f85a6fe4d44a9bf08adbd4334750ebb318c8ecc78a729486e3bae4f01ac4d49755016fd549bb58fa80418ff8cf13280295ee1ae131967e0c32508aa4f0402cdd1b5f9582763641412d8f26e4ad57c32f7536e11f9450ea3b8a233936167760230355e20c3d6843e82a919cc00dfc6f52f780f74c8648978018969f87e0d83f5a8af5b", 0x99}, {&(0x7f0000002640)="68ae2f9917c18a5219867384d6ec43a8ba5d456097f37b31f2c82861c91aab8e90e3ebf5be8ccd2f50524e0d9d449d2e9ea6cbd76b4805238f63b99f05f514588e2b2c5ebc4a672c05d0e70017be1bd7ee615958537188cfc496dec6b937018738ad073f29e6923a4c17", 0x6a}, {&(0x7f00000026c0)="d695f6", 0x3}, {&(0x7f0000002700)="70735c7d4f5da262c759f21a8c0405b91689682ef431d2d0b4876e09a47dc05e6180e17604f6b712086fc82cca9faa992790bd5839710e3e836499a3f72ea6a76fd5682210218da718d3b2ee9dcd7858da1b84621c8b8f1e2921e3e73f153ab2466b74a7370d956ca1f69c84e6cb9bfdf665d357725bf713175b89", 0x7b}], 0x6, &(0x7f0000002800)=[@ip_retopts={{0x24, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x44, [@multicast1, @rand_addr=0x4, @loopback, @loopback]}]}}}], 0x28}}, {{&(0x7f0000002840)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000002a40)=[{&(0x7f0000002880)="95028c718e0cba2fb94064fc184539f34fe4", 0x12}, {&(0x7f00000028c0)="c7645734b64e1d171ba3b51f7c3855e375ef0d36b9779c46f97b01574c28070341d6059a0dfb08e0c1648bc2fcec10da155d05b5127cdb0c173a4e41d109874be88f4e27b6a48d48dbf46dfd3fe963aa7170fd354443fa5c4a8293847fa3abce78e23bc1bdd3d914c1d718b3ec1d4403212a2b5d98f0aaac19cfed1dabc3b29dc7ee781eb23a03b5290cdf08aeac7db1fa8fd03261b5587640099caf1caa19d41235995c1844253d36ebde08aad06aaa14c4286f2891ff1de76f899fe9b5f23f21fb6e6f43ad2e39d7ac46667fa5", 0xce}, {&(0x7f00000029c0)="2a14b025eae10c79c23a2543bd7ceafadd18be2c57cd4968615e3feab2d4dba592a0e8474354f3e1be4b5d6a7ebf69e17bcc29ff4e08b4bb78cd55b75bf4f90425851b0a3a8ca0", 0x47}], 0x3, &(0x7f0000008b80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0xa, 0xffffffffffffffff, [{0x3, 0x4, "a9f9"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef87}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0xc0}}], 0x6, 0x600085c) 08:38:49 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:38:49 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:38:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0xb1010000}, 0x0) 08:38:49 executing program 3: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r1, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) mknodat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:38:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000081e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:38:49 executing program 2: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:38:49 executing program 3: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:38:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) socket$vsock_stream(0x28, 0x1, 0x0) setresuid(0x0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000008c80)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000140)="e31b0ade652bbd1c0a742f712abc829eb8a4099261c10ea6bdb32b06fb7bd6f9e21e0ee297e013c7b7f84a1f01eaf4c9a050686d989155d9de777f0fe0c5b55ea039ab7f99c7923d9e22817f0b79cc8e205f6f9df6c4a0d900bbdf644cb5b28e76711da928a48e1d5347d3ac45", 0x6d}, {&(0x7f00000002c0)="bdcc816463ff65ba953c023d34e6dae6c08bf3f4ba7946443f7007f231a6edd0dd5447183e2293c0c95e6c93c20a9d38d7eb335e5db95ea1d7988e8ce1fc4e9cc4a1cd06cb48156764fc8e22bb30f3d9f1a26dab0db52b1f595a5516bab66044121c496e338fbbee62c33916e3ffc6520e01c140d65e0657d9b310105a6055fdf09f30874d52d5bc17125763426ffb698070ca64579ba466ee5dac6defbd879d9a6316b1335679eae9cc3f49b271097ec04329b818898f1dc6913fff825367a4478b93e7de77c5", 0xc7}, {&(0x7f0000000040)="decb72915b6c7cc2ab712945e5bab09a5d9e741f15081b762cb2af6c24adc8a5d54436e5e4075eb7816fd1284f45cbc7d3f42526dc8b05eadc2830", 0x3b}, {&(0x7f00000001c0)="83b3df1ed1257626982e73ba268bfe7989c30409fc0db7ff8cd67b3501704c5e02b987d9c389e02c995c98628cf1f8c9ac11dc7d7d938de91af0839b80ad09458d3d428ea63096d7ac6fbfcc12c3ead5764796f36993b18f3bf72dc13a1507fefa744cf3f27ea106d169d3d80f26dbf902", 0x71}, {&(0x7f0000000ac0)="f8407632714924959dd9b696d2a7329d6956045dfef70f7431b7516809c5830b36fbc554ac9cd84db7e193ee20e0010c971cefbc93d9fc87efdc1c35b4011dce2022ad3ee86b31f3bcce7148ce2ca9f855dbd9c1a03b476b368ed9119ad7b156ff9b9b3d60097e0e1dca200e5ff45bbbe9d38cf923265492de6c892f21f7160000b9849cab684ae230dfce0cf8f6cdcf70fc20beaa13cd7309430a1a6aced2e008c6ee1676009b0b4c7b64ddf009d3e4cfb16c5738385514fc93aeea80843893528f17008b09f98e262ccaf8858b7529323021045b389aab3f0fcb5d8c60ea876815f853a42dd423cc787d7f117985cad9437a711a2eebe83a8059466f01677d99df4f7f5a188111fba3e6a4586e60404d95784d1da4a7824efb7a8d2e61341499b8f2c8ffcbfedabc461fb66497e83f3c2ad5b6f71a47e503e200ed4976f6bbc3f86001d9dd473017abcb7ef8ed1700cde775bc40aaab0751c3264bfbdf3c0359abd9c960d1c394bd0c4af124f13bf4c6fa041bad2b6dd5a9c2300e6b0c614a797171265d3ad888e9585773fb6140c971093845e0d420626cbffd959d38f65023d8a067493dfbabebcebe2a564999457163336bd92271c551313615784da74703e5ba88cd65ea05812141769056c86f79369776b80c79cbb7757296bf587f9b4f0ebc27ef3860caeea3804e116b7fbcadde3c908117e8faaecaf10643158281d8904206489564ec5987df5cfff7db2b077a0be9dbf37a0e02f46c92b534ebded3db7f933da03f282f584008cb71f0da45308f9f38bf97119da61b95fefb8b51d3edb910ad25db81fb0ae1fa629569e93a65fe316aacb55756f2a4cd4c76310f414319e705654048e10859f8f22e7ca55a5e09d7c17045f44c0f7554b6a7fd71f08b4fb1b8857924b63cb151ef6c19f967682d04005ac2c865058d0b74192f61ec1f4820b011c8dc31dd07ccc146304c2bfc9a41a390a9323ac5e0590207a098e00da1937457308f8f713f9609d309901b90dedeaf22f7c9720b51636da657c828fed342de02eea9ab85816a8d8d27f09770cc663bbcac6a0df8bdeb1de44c87829cf5b3911c23347613a8e10f16fa513344e87b3f9eaa6180077160e0388b2dbb1f7b97f3d581a13acdecf11d2b5d1e0ff5e0dbcbd74c7f37fab6cd69b5f959f03e8334cd0ce263891b262d0f83c664954d5fd33f980d1602545151fcc91303c88ae4594aecbeb1fa3d96fc3cacb67fa5b990368bade78f445c96885a2743165d4d2709a2bf4b023b6bc5daeb9ee6399cc54147cbff6b7c07b62afac7e528dcf2c76a06e1488ada73308485f98c1afc4862db88cb5b1919a0582803abfd4a8af804c6fb126625673f85b6044a3dfc6693e5294ebfe12dda51c080aaa26b1e82018cb73c1987aae021c97e4dc4ae70c9d16043b317ff655b69a81b1ea384dd4ac838d716a436689738cb231334b629beebb507ced503e27465ac28212fb65dfe36eecdb5e129a32c83c17d01b7a8a80464529533a46ca13917ad64ac4a9dc6ad2dcb1cd0132ba13a22b849c738e871a6382cce054cb507902e7b21694391059ff5d854a768a385679de2b05149d8f51a7dd473c04cc5fac0a567cf4c31278b8a5a244cced7cbd517e7856461fa4a018946edec5fc83ad0e9a85701c4d577f0b92755d5ef6da7816686e9b18c9031cf6341f1f9d5b2979fe0cc17fdd0fb2a9c5b3f6149e1ed0ba4fa22fa501b3127a3a5e801dc876b575a7176b4d96dac48afecf1e397e1d43806e31702126f17bb6586eb2e90b796dc4f0fe6afd4f366f30f5ce81981f3c4dfdc97387174dc65d3d0094762797ba74d68a35d1924251bd44f09cc8c497b26069271e5a54331f53847788e15cc7cd7d8f31537d425eba80e70d0033895743592154cbe9817f13a728e5e1dfa31578cbf95ae33e0a467ac856ff4422de060226fe97da3d75c317f3de339e4dd5493451304056e0e439189d405b03af86b6695ce67358e9159ed788f469a803b0018a5234b0d129e52cd17f3a3f2c7ca22ba6caa9d5a04cf8410479cdb8507862814877bbd84bbd83bae56a43498ed254a44c27048991d63143a7db2a94115d097d48ed49ae956b882ab42753e01f20f0b7f47b75996dd3c8ec50b93824bb2332b63e040b50e9a41fcd9544098574d563572ff20b6c23f6a34ce7f81f057bfc3a24d4fddf97cef617420daaf5dc80e0d5d8be1ccb4a728131d6f63173be3eff5da095d53e1e3326550e59d14bb48054651e50381b914deb622e99919d7423146ebad739bee7ef4dab7bb7518bc5696f510d68ef557ce7a57f3d91dd5445aaa4afcb66304e44f2acbf88ce8dd3b1927b19235bde83f88c7ec10fa3931d96a02d02c0fd237077ee2f23ea38b3f3d73659c0b1343475e6ec65b668bb5899adb1f96cf6e6f733accd52638c8a14d3bd05e5c2e91b80ce25a666c2984864bbfb26c60e59709bd31ee00edb04561093c0466629e6fa064eb826eba197df544fe84efdf6ed3b918a002edde00643cfc4daaa08822980a62a73bf84cce8d0b24a4d949472be8099e0182da3d3b30f91bdc30b808a59058f4d81b76407da6477e5545caeb95c9e33c3e2b5c0180cab813042cc686d6af416436f8e644d467a1029aa77795fde8c252919fc3b3a989dda875bf5bb33ab08d503226f069b61d8e452104b91070b723f698b4e79f7c0fad6ddf10e6f3c622bcf675caf46dfdeec52f56ca2ff42d6a0db0fd775cecd7b808aa02dca3984462a2e883c617fae37815199d5a6d97f498d3d9f6924e6ac21210257ddd08fff6f1dd59f1dea33258b80585861fadb2f073a4bd125169a9fdb3598cfcf9abd8c77b6671f3c08059db28d5a8a3bc40667a4492eb71fd20c08831709937c54e1199db7e5673a5d172ef480017825530c99daa13c7e6621433fa243140bc91ff938ced5952381fe6ee77b8e3a35cf20150dd3365f3dd2ed3f9ebbf1b857f4855d56add803dd21b67eac78c5d3a5eb660f2e9b7eff673d139e21d29a8395ae8fdad08fd087815d109f881280acdff3583fe00898e86cc2187648991cdec0e3011179c5284d89ec1c8050ee027e950ce05c1fc23759ed9a83044539a0280785b1080da30ecc6c5dc2d7ed670d1e0ec34238e45b8fd916778a0ceb55990d27033507e6d828e2ba870e94143e0e7557f272705b55af6c2a81ba99cbf4195419eadd040e7ad5be445da3d79a437e533f7fec9d7e899b26defd6b3befd6667121b09594b7abe8bf1593759864b3dba0b74565b1e7f094eb92348cb0a3a91953be8e0b15e5a55b7f5224ccf3db88170f0f229f2e52b96ab8b40390d9734d9c120a7c254a0bf7d9750754be9ed76e004190a6e28c4a923f52040c0fa684e0388abe4ff3f838af31997326b1d0770294e4c13a3302895129c0afbef0e45297a43e7fdb83d288e597e66a24361050bd10f2232d81ba7e07f8fc203fac348d0c7f32b161754db713e88ac96bfec05acf49d9c27eff10e689c837d66898fd607b31947a048e75d3fd2082fb757e257ec449fb2d62943c135917926e0900f6651f14ec665661bed2772506c8c9d89a78a8470ec0bcda2fdabf55e595ba2c71532ace1e8109a970d398b82363406d196361280056d89a04ee44d988283a8a21c995c6237e87d55510f5d624097c67b24c240161b5a9693a1d2ff13ca478bf6ccf1110e6ce99d02b96191079e4bc092e8bf098265dde829cfe45269094e960c721ee7793bdf5880c29f277a68c61132e9b04f1b0b0015c9dc2e9dbbfff9469e182ca1690add1237bc16ee64d429e1de86fe0d1da0d9ff091a5cf34c5b95763d4dc426578f6a87ad858461bd61dd6ae58ad52e0152e2760a3d926135fb7ecfa2092e542ef784259df90c7114984e708211fe1281187d2446e7e7cd59d4513fbc6be9b930ade2e841e013ba6918e8a8951e4678da9f946a2817119d102914bce2dc418c05e9471c4e7c2e97bc243688219d86048dcd1c3329dcc5361ce9aed4d586f0c7e5f039bd070ed1727940f26ce9e5fd80b1e25e10820bac061f0b5b41623a655881b4c92bd77a4f2ee359a584059a03d645056bb374eb5314fff674fe7f904f271b9d6e3634a38d7044c340a81d57b0d8f3ee923a76ffcbeee09db1921c6c7a458a04ebb1742331e693dd4cc884569a9d925c34d0f86252c17aa50e3678125fbf2dc5632e9fc998f344c2a77f64b32dc94061fe924b56a87982fd21d7d2348d5dd9e65222fa9431acf867669cd713337da1419ab44e320ba87b0f875db5ac8c41f97fd1ba4cd5416533fc18b344c73df8db6285fe90225fa37c6d13abf165e53aa4f0b7e94699569a4aa6e900c18ed1df292dd9392bb718b11522aec65e29519f4c2d16039168afce66d441902cc1cb8f79bc1a7d7f3da04b9959d002d33bd64c46164879feaa7dfc72aba8e5e8edbfd6458d826b288270ae873ffb6c9a3747e4be55a002c1ae77d54a33fc4595b6a3cf2d88270f8518f125f2c76be3c5b6b3130fdb6be88c865c2e2e78632db6dfac9061e59a7e53462245b0da6842957568a8097cf9368959f35960c566a11f381ce1250aae8cfd831c02fc9359b3f1829ba7051fba7e54ea7e23e2480f54c08383a969d9fb1bfe2832ecabf2ae05b504b49c877f54d1716421707da5f166e3b3b9aae2d37edad5a9c88dc1c972550009ee948846ea338314831d045ad8f935c693e78d8767c126d9fb8b95c8768c0af0e3ffd6ae52763237282c4a649231d75d3bd2b8c9515deb783508a3b814fdfc157afc3c5ca45b5d93f709638101662119b3b1ebdb81719110478e2686688ac22a79c4bf8daad0e8571a2cd3bec71c09203cd4b2da88c9df87e494bff908d2cc857d88bf66462f1e578b6a66e53455c8c33765f56eeceef3388c7c3989b9c6681b372e452b1071f9a374069e555f6ddc984cadad752f6e22dd6df350d4c4e5316e60377f9341e22f8bf460c63d3b770ba15b8e96975a317d20d85ec094da2cc03ac80dad548b6f3f300fc6caf7bb335b4fa146f8bc4f4c33c3269b168bdc6a784373e77045011da46e9c0d506948d6092ed32ff686d935892c8e051b2631aa2dc3246dcddfa961565885f3f3fc654d9f3d6d84417063a0a83ee0a43cd2c248dd649f345189849e322cde6905bb6b59c5390e565ec25b347dbc367477772df2cc075457a1a3c4c70ae8aa92340f8729199309a3f198c6d58800082f4f818426465abf8802c9de19318f554b68008934939815f744d9e3c56dbea225c336e807909f0f7e7b3ee8ea987135ff28e26fa1b327f17cbbc79739f46951fc4599c2f9a5247d0a024d78f01d99b3b8264d1a5a9cd43d8dc0a7a3c7fb21b0e7273120012dbeb56b6a027fe7b7da4e06d624c1900b6ccb2af348d3dfb66275bfa1323a50a8c4f7abc2f2f2d9a5271d86617c2cfba3942598f21ed1ffa1c07099a0aa1c3a59a4d6d84fb0042d20074f714d2b7af22eb06c8d47c9fba78a894530e5a1011a5154daf5049542d405c9ae5d492d38a5fb970e8108cf645947fbbaa03377106c62b4ce969c48f5de4900da3bce4f7062b85feee1df0864eba005733f5baa9c911afd93df51430ef90cb02d5394e2b25b83812d77525326ca926798f8037dfe864a0e945154e935405865c806a7c59d09214450fa59fcaf7afae0ff5b86906c31cb2debb10965987f900e9624ba0db6cb1ae1f830e58b175877022d72b12e1fe6df1a5dfdf307d6c11e868b16cc5c87e9c46523aad957f07320445687908feb29ac439a105503bacd", 0x1000}, {&(0x7f00000003c0)="131500a017e9f471a520f26115b7131a6e5b25625e6a03cca52c3400018a952036d7dc2128dcb4336c6faae1824ef866100528573b2df6be1ae2d2393ad7994f0f28a0d55d69f39bd2b153e176982c65c5e92598b0e96e7f7ec609ed08c7e4080b097c4e1a9b35e3", 0x68}, {&(0x7f0000000480)="7e7f0bd706f56100fa9d25dccdbcc1886abb4425f9663cc0f83ccf8781d450b4e3b737ed556a25562a90bf23b67e00d6f258f770d19db46fd6c3c05864f313af1eb2fd8fd93f7dd4b76910769cf29d1ec4ba62a473336b0dba86c5d5d0dc49d03b2080993ee6a63e34fc26d96afaf9c3a549e7cc4d96", 0x76}, {&(0x7f0000000500)="b37ef511a1d7d6cd447fc0ab4f4db4631888d3e39fe9c24189e455447e6900319e509ec056d7ec3cae37d426aeadd7fa453b67ff74f399e27eae6acb41bc757fff32a7918d4ccffbfc223a7c4868f8dd4fe6911f9e6eef91995c9cff3d34c6b962a8f8", 0x63}], 0x8, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x68}}, {{&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x4}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000000680)="183af2bdb07a1b9717efc8dd22ba46eb20ddd60bdffead4325b5afd710f6b26e61a1be2983741df7391b243eb9c14b0b199df035ab9ea764685a6db9b97ed0cb5dfd6f589bdf6543dcabffd85dee3569b847241c04b9b5d8c3deec6e33f4d4a3fa6529eb61c93e8fbb0bd7636a490dc7e17f2cbde304d8a4001121a3d7a39a095e6a2102be40588cbef9a0a892a359f05af8644d3b534a930424e7431b13b658e63907f2d53826d7237c6f94c8cdefd231cbde9786b7c9650ab17b7e10f480e833998c8d0e72bc432cd31a4b8405daedfddd912d4b53e42869e4c45b13dd5e", 0xdf}, {&(0x7f0000000780)="9a34c82f4ad6009b0f93fd888db18214f8cf72dc13c37b214b545177150e8e4fb7b6b8801c85f5a7227e638c7e51de26d8f3ce63c9371640149bf76f58db5cd8dc7d86b5f122a4c9212ba3ebe9442ffebba99629834a9d2afa77b3334f2d803bc896717e35d28ebcc188f2cb6f449a351b8c7c4111f7666e85b0691b322682244ed051a2291ed4bbd42c52b212e594285a8fc83cd6d97dfd593a0df27b04bd14e6eb3ba0b6059ced551fa922fc7f", 0xae}, {&(0x7f0000000840)="1de999bfc5f5aa70", 0x8}, {&(0x7f0000000880)="373104ae7e954bd5204260500aeed16c1f9329f6a215c4256ebd0db4a3e20c019546bd9d487a6180a77fbc22b9aa762e47f05ccc39ffefb3a171a33a571fff37d11818a4c6f5976ae66cc834de929a082bafc4682449893ae8faca2a32b2736d1d2342861d4a753a33b56bd8f0622213e7e568244f681a681645c7d964639854006f0e42364d927a6a20b24064435bfa071bf7d80cf27a5f5469802590f81144e18a7308c09be74e93a1f0c648d70b94213b2abd252f1f863d189894ace989e9aa877e8cf3cb0798d928e72f4ca76baf075203582f2d", 0xd6}, {&(0x7f0000000980)="4fd38492e522042074865251dd03e5330ff5a23b12fb58fd94a2ae49918ae3041f6009a60e9d79ed597c3219a4fd4edd9b70f483cd51723ff07828ca834f00ade4214dbe3ee2a50f1af852e104de03b429c8e4170e2b1ac876c5e95a2b7f3a25a891dec5914e1138a55a7ecef73f48405f6b44e2eac259272c107cf20248e1fdea91af77f9a6516012e8cc5bf982b0120c7739bffa80623f4fef211ea3023e9f3e67e7560056a2fc1a7ef4b15edbd6ac4219e225e8697341fe4d9f6f82a076a2d304769c7821b92ef4ca920cd522c53655048fb98d809ff5649e6bd83378fb110ec33c1a9a", 0xe5}, {&(0x7f0000001ac0)="af8ae174deaf3c0b32c0bb120f76073a89ae5680c12fd1cfef69fbcb4417c48b642bdfd6b6e3c0218a18f4af35d00c48507242fbe8078730d03af019ef464a857ed06b45bb10c0b693db229198da0cbe878f98be95e50f46430af5a5ece98399c114c7f91c25791f819ff67911f0f58ba44253e1aa40b4dc3227221e2500a71e868babd495cb363fc195e6fd6eb34a91fa66639bb891fe0d3509dba71fc0fa8a2bda8f", 0xa3}], 0x6}}, {{&(0x7f0000001c00)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001c40)="f06d20c01b1ccbfc15a8fcec379c8024aabe5c612192cd2f9e9259e6b8f4", 0x1e}], 0x1, &(0x7f0000008e00)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x6e, 0x1, 0xf, [{@remote, 0x8}, {@loopback, 0x12a}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}]}, @timestamp={0x44, 0x20, 0x45, 0x0, 0x0, [0x3, 0x1, 0x2440, 0x80008000, 0x6, 0x7, 0x1]}, @noop, @timestamp={0x44, 0x1c, 0xc6, 0x0, 0x4, [0x7, 0x200, 0x7, 0x8, 0x2, 0x800]}, @cipso={0x86, 0xc, 0x2, [{0x2, 0x6, "9c1a44f4"}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x24, 0x18, 0x3, 0x4, [{@remote, 0x1}, {@loopback, 0x8001}, {@local, 0x6}, {@multicast1, 0x1}]}, @generic={0x82, 0xe, "a4ac0724a6c074274eefa0e7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x100}}, {{&(0x7f0000001dc0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002300)=[{&(0x7f0000001e00)="9be8a0a30e2c7f0799076e9a7e2a8da9f89200ea0354a513613d854d46abfada81ef75e0dcdcea8ec023d31a3604d72948e5c48c6ee546621bba49524f3a27b2e0df6744edd7b5b033e952dcb4945f5bc47d47679cd69416dde8ea71751b7fdcb088e15f51bfb8e75e462216373a3f31c28e3aedb2590a5eb88c0cea19643db3f6dfaa51850086372665f3089bb5310d881fa674c4e83a674589de6df6f8cc4660e06d13aa14490df4164d8c2e3168366d606f163427306656df48a8ec5db21d164527171092b0d44aa14c81990a3a988122bc0d439394449497feaea1293e9bb5d42755017cf1fbd7893e95e1e7b567aca85e61", 0xf4}, {&(0x7f0000001f80)="7c386cc044fec1ee527b64047c0c2c7a904e1f2f6231c15cd5cfa7a62833a6eb15eda84db2a474cf7a937b2bc2ffca4ec238da5d07ed3c250bca767a192330bd94ce74ff06415823fc29ef044b171abadc2e52fa0ae8353896652a7061aa50726e4232f787e6903b7f1cbf0872422ce9d1ee460d49ad11b9c942766c6a68dba1d8064fb442d652570b2dd73736d9e9f58a82624a694c3af60ae3947103383df42749a3ae43850db6562dc3aa0017d87c4154cc6d4a75d90203c6ad49617098f0df1dfed54e0c657495300c22a701efdc7ed40390c58f9ffcefcb4c4b33eceadc401b10231f8dbe29e6fdf89a05d92838a77f", 0xf2}, {&(0x7f0000002080)="df6f6964d9d4b4aa92384e41120fb3e0458ad476e15e3e1aba0f32d6b3d295e1dc818913d6e3eab4b802c7ded19cf87e8abacd7757533ce33cb50bb243abe07b25fb12e0168451c8dd44bf17de44a34f0d1f17c221dce08c10b761a2254339d1dba48d3e7a272cc680ec571955fea79ad5242ad37e05ce7e8e29580c75b1cc75", 0x80}, {&(0x7f0000001f00)="33121daa0cc7e73f4b0f739453f4a7ec3bb8b8564947526a61fbda69ea47ae7b9ff1f264a61c204c1145cbb49aa373ecd6e94ad85edaedee2811", 0x3a}, {&(0x7f0000002100)="d7e5697bd4752b47d7abee5a2a3f3de365f5b6b28ba70d9a2029804f263f150d884c9736246af9d4000c4d950ae1eeaa29cc53f2ce759dd034722203a60f18bfd5beccb105a36c5eed138f7d315e9b8079abb5c94547e75ebfdc4542575f9ce112aec0", 0x63}, {&(0x7f0000002180)="757241eb7689b5fb7a813f8e9e9f58fefbfa4669d7127f1e1d9188c5524e9a13617f77d1f99f4a415a82a56496c7b43eda5244ce4097a01cd98537c386c36a803ebce00334990ee6873793c9f608a27e", 0x50}, {&(0x7f0000002200)="fa7da6398560d85c31faf97b252e01257a3e45b4c36471e982eecdaf3edfa9d715a978266c7b818f1ab2b6b133d1797904e739d6fbe0ab436baaa58ff63d7bc0d6fd7a633fd59dcfdb0952015aac82af4d5c315b082366f31364853adde76d73c07ddda03788eaf41fbef929f8127576c201869edb82eb5fdf57c50e5ba1d3bef696d0f7554a3ae41fd736873f79d50e29996ba654529dcc8c15f974b0a483376a55e4499ea8105a7bae7c778fa858f7b0bc63402dada9478643f14ef9f877621e694b8c46c009213b7d6aeba332e7e423aaf322a33eab4fb1ab504635183aa7af7979cdd3c239f10ec9709b69e96d8b921052", 0xf3}], 0x7, &(0x7f0000002380)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}}}}], 0x68}}, {{&(0x7f0000002400)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002780)=[{&(0x7f0000002440)="550e0938c5c0f50e1483a6a392f017c7d05022832f5a26ef75d1408ab3107817f67cb8cc868c51586ce98e17b1d59d33928139ec381939a9a32d73ec858d593ec29fc410f48011e6262b148e8df06bb8ee38befbe1d5073a33037b2421badfb3657cb789fd6ca39f1088390976a11ead797e41021f748647abe35320535de8f493b8f17697dcfe3cf66a9ba38f8737b8c061ef6b259223a1009975da6da852b029ec0423e474dd1c659418e7b05195382c05b285e3d4457604", 0xb9}, {&(0x7f0000002500)="041eb6e0f6ee6080b78751b0876d7fa3050f2eec2ed35957295e59a3a9316eae03457506221122265b71d57f7367cab94c0fbc1e012983ee4fd14e5977d52ae6052f58718c9dc94daea60fdc6fafea0e38157f73b878f154443fec514ccdc711", 0x60}, {&(0x7f0000002580)="622dd9b38709b3858d808865558770be9203ec256e4e1f85a6fe4d44a9bf08adbd4334750ebb318c8ecc78a729486e3bae4f01ac4d49755016fd549bb58fa80418ff8cf13280295ee1ae131967e0c32508aa4f0402cdd1b5f9582763641412d8f26e4ad57c32f7536e11f9450ea3b8a233936167760230355e20c3d6843e82a919cc00dfc6f52f780f74c8648978018969f87e0d83f5a8af5b", 0x99}, {&(0x7f0000002640)="68ae2f9917c18a5219867384d6ec43a8ba5d456097f37b31f2c82861c91aab8e90e3ebf5be8ccd2f50524e0d9d449d2e9ea6cbd76b4805238f63b99f05f514588e2b2c5ebc4a672c05d0e70017be1bd7ee615958537188cfc496dec6b937018738ad073f29e6923a4c17", 0x6a}, {&(0x7f00000026c0)="d695f6", 0x3}, {&(0x7f0000002700)="70735c7d4f5da262c759f21a8c0405b91689682ef431d2d0b4876e09a47dc05e6180e17604f6b712086fc82cca9faa992790bd5839710e3e836499a3f72ea6a76fd5682210218da718d3b2ee9dcd7858da1b84621c8b8f1e2921e3e73f153ab2466b74a7370d956ca1f69c84e6cb9bfdf665d357725bf713175b89", 0x7b}], 0x6, &(0x7f0000002800)=[@ip_retopts={{0x24, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x44, [@multicast1, @rand_addr=0x4, @loopback, @loopback]}]}}}], 0x28}}, {{&(0x7f0000002840)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000002a40)=[{&(0x7f0000002880)="95028c718e0cba2fb94064fc184539f34fe4", 0x12}, {&(0x7f00000028c0)="c7645734b64e1d171ba3b51f7c3855e375ef0d36b9779c46f97b01574c28070341d6059a0dfb08e0c1648bc2fcec10da155d05b5127cdb0c173a4e41d109874be88f4e27b6a48d48dbf46dfd3fe963aa7170fd354443fa5c4a8293847fa3abce78e23bc1bdd3d914c1d718b3ec1d4403212a2b5d98f0aaac19cfed1dabc3b29dc7ee781eb23a03b5290cdf08aeac7db1fa8fd03261b5587640099caf1caa19d41235995c1844253d36ebde08aad06aaa14c4286f2891ff1de76f899fe9b5f23f21fb6e6f43ad2e39d7ac46667fa5", 0xce}, {&(0x7f00000029c0)="2a14b025eae10c79c23a2543bd7ceafadd18be2c57cd4968615e3feab2d4dba592a0e8474354f3e1be4b5d6a7ebf69e17bcc29ff4e08b4bb78cd55b75bf4f90425851b0a3a8ca0", 0x47}], 0x3, &(0x7f0000008b80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0xa, 0xffffffffffffffff, [{0x3, 0x4, "a9f9"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef87}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0xc0}}], 0x6, 0x600085c) 08:38:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0xb1010000}, 0x0) [ 964.315729][ T6311] 8021q: adding VLAN 0 to HW filter on device @ 08:38:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0xb1010000}, 0x0) 08:38:50 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:38:50 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:38:50 executing program 3: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 964.854529][ T6315] 8021q: adding VLAN 0 to HW filter on device @ [ 965.762200][ T2640] tipc: TX() has been purged, node left! [ 965.851504][ T6318] IPVS: ftp: loaded support on port[0] = 21 [ 965.899532][ T6318] chnl_net:caif_netlink_parms(): no params data found [ 965.922527][ T2640] tipc: TX() has been purged, node left! [ 965.926747][ T6318] bridge0: port 1(bridge_slave_0) entered blocking state [ 965.935465][ T6318] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.943213][ T2640] tipc: TX() has been purged, node left! [ 965.943721][ T6318] device bridge_slave_0 entered promiscuous mode [ 965.955898][ T2640] tipc: TX() has been purged, node left! [ 965.956578][ T6318] bridge0: port 2(bridge_slave_1) entered blocking state [ 965.968681][ T6318] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.976451][ T6318] device bridge_slave_1 entered promiscuous mode [ 965.991825][ T6318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 966.002712][ T6318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 966.021500][ T6318] team0: Port device team_slave_0 added [ 966.028473][ T6318] team0: Port device team_slave_1 added [ 966.084322][ T6318] device hsr_slave_0 entered promiscuous mode [ 966.112529][ T6318] device hsr_slave_1 entered promiscuous mode [ 966.162166][ T6318] debugfs: Directory 'hsr0' with parent '/' already present! [ 966.372932][ T6318] bridge0: port 2(bridge_slave_1) entered blocking state [ 966.380055][ T6318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 966.387471][ T6318] bridge0: port 1(bridge_slave_0) entered blocking state [ 966.394560][ T6318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 966.569996][ T6322] IPVS: ftp: loaded support on port[0] = 21 [ 966.582225][ T6318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 966.701670][ T8530] bridge0: port 1(bridge_slave_0) entered disabled state [ 966.710008][ T8530] bridge0: port 2(bridge_slave_1) entered disabled state [ 966.837119][ T6323] IPVS: ftp: loaded support on port[0] = 21 [ 966.970859][ T6318] 8021q: adding VLAN 0 to HW filter on device team0 [ 966.978187][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 966.986122][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 967.094819][ T6322] chnl_net:caif_netlink_parms(): no params data found [ 967.104166][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 967.112886][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 967.121338][T26499] bridge0: port 1(bridge_slave_0) entered blocking state [ 967.128378][T26499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 967.157448][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 967.166252][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 967.174820][ T6082] bridge0: port 2(bridge_slave_1) entered blocking state [ 967.181991][ T6082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 967.296032][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 967.315748][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 967.324932][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 967.333681][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 967.347755][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 967.356208][ T6322] bridge0: port 1(bridge_slave_0) entered blocking state [ 967.363813][ T6322] bridge0: port 1(bridge_slave_0) entered disabled state [ 967.371363][ T6322] device bridge_slave_0 entered promiscuous mode [ 967.490321][ T6322] bridge0: port 2(bridge_slave_1) entered blocking state [ 967.497584][ T6322] bridge0: port 2(bridge_slave_1) entered disabled state [ 967.505735][ T6322] device bridge_slave_1 entered promiscuous mode [ 967.512886][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 967.521584][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 967.535003][ T6318] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 967.545637][ T6318] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 967.660320][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 967.668780][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 967.677775][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 967.686637][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 967.703580][ T2640] device bridge_slave_1 left promiscuous mode [ 967.709849][ T2640] bridge0: port 2(bridge_slave_1) entered disabled state [ 967.762722][ T2640] device bridge_slave_0 left promiscuous mode [ 967.768886][ T2640] bridge0: port 1(bridge_slave_0) entered disabled state [ 967.805882][ T2640] device bridge_slave_1 left promiscuous mode [ 967.812180][ T2640] bridge0: port 2(bridge_slave_1) entered disabled state [ 967.862855][ T2640] device bridge_slave_0 left promiscuous mode [ 967.869109][ T2640] bridge0: port 1(bridge_slave_0) entered disabled state [ 967.905865][ T2640] device bridge_slave_1 left promiscuous mode [ 967.912422][ T2640] bridge0: port 2(bridge_slave_1) entered disabled state [ 967.952847][ T2640] device bridge_slave_0 left promiscuous mode [ 967.959192][ T2640] bridge0: port 1(bridge_slave_0) entered disabled state [ 968.014806][ T2640] device bridge_slave_1 left promiscuous mode [ 968.020938][ T2640] bridge0: port 2(bridge_slave_1) entered disabled state [ 968.062682][ T2640] device bridge_slave_0 left promiscuous mode [ 968.068831][ T2640] bridge0: port 1(bridge_slave_0) entered disabled state [ 968.139719][ T2640] device veth1_vlan left promiscuous mode [ 968.145667][ T2640] device veth0_vlan left promiscuous mode [ 968.151614][ T2640] device veth1_vlan left promiscuous mode [ 968.157410][ T2640] device veth0_vlan left promiscuous mode [ 968.163562][ T2640] device veth1_vlan left promiscuous mode [ 968.169288][ T2640] device veth0_vlan left promiscuous mode [ 968.175324][ T2640] device veth1_vlan left promiscuous mode [ 968.181053][ T2640] device veth0_vlan left promiscuous mode [ 971.312396][ T2640] device hsr_slave_0 left promiscuous mode [ 971.362715][ T2640] device hsr_slave_1 left promiscuous mode [ 971.418538][ T2640] team0 (unregistering): Port device team_slave_1 removed [ 971.428674][ T2640] team0 (unregistering): Port device team_slave_0 removed [ 971.438624][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 971.505893][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 971.583843][ T2640] bond0 (unregistering): Released all slaves [ 971.782568][ T2640] device hsr_slave_0 left promiscuous mode [ 971.822250][ T2640] device hsr_slave_1 left promiscuous mode [ 971.888435][ T2640] team0 (unregistering): Port device team_slave_1 removed [ 971.898549][ T2640] team0 (unregistering): Port device team_slave_0 removed [ 971.908677][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 971.946065][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 972.027489][ T2640] bond0 (unregistering): Released all slaves [ 972.222425][ T2640] device hsr_slave_0 left promiscuous mode [ 972.272161][ T2640] device hsr_slave_1 left promiscuous mode [ 972.318333][ T2640] team0 (unregistering): Port device team_slave_1 removed [ 972.328554][ T2640] team0 (unregistering): Port device team_slave_0 removed [ 972.338626][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 972.375629][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 972.433462][ T2640] bond0 (unregistering): Released all slaves [ 972.682495][ T2640] device hsr_slave_0 left promiscuous mode [ 972.742143][ T2640] device hsr_slave_1 left promiscuous mode [ 972.807888][ T2640] team0 (unregistering): Port device team_slave_1 removed [ 972.818455][ T2640] team0 (unregistering): Port device team_slave_0 removed [ 972.828134][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 972.864999][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 972.934412][ T2640] bond0 (unregistering): Released all slaves [ 973.045776][ T6322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 973.058288][ T6322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 973.075103][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 973.087809][ T6323] chnl_net:caif_netlink_parms(): no params data found [ 973.098829][ T6318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 973.120752][ T6322] team0: Port device team_slave_0 added [ 973.128086][ T6322] team0: Port device team_slave_1 added [ 973.204530][ T6322] device hsr_slave_0 entered promiscuous mode [ 973.242382][ T6322] device hsr_slave_1 entered promiscuous mode [ 973.309284][ T6323] bridge0: port 1(bridge_slave_0) entered blocking state [ 973.316524][ T6323] bridge0: port 1(bridge_slave_0) entered disabled state [ 973.327023][ T6323] device bridge_slave_0 entered promiscuous mode [ 973.334801][ T6323] bridge0: port 2(bridge_slave_1) entered blocking state [ 973.341833][ T6323] bridge0: port 2(bridge_slave_1) entered disabled state [ 973.349955][ T6323] device bridge_slave_1 entered promiscuous mode [ 973.379481][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 973.389566][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 973.398708][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 973.407503][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 973.428543][ T6323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 973.439259][ T6323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 973.461058][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 973.469511][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 973.479380][ T6318] device veth0_vlan entered promiscuous mode [ 973.487494][ T6323] team0: Port device team_slave_0 added [ 973.494398][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 973.502634][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 973.515156][ T6318] device veth1_vlan entered promiscuous mode [ 973.527660][ T6323] team0: Port device team_slave_1 added [ 973.584083][ T6323] device hsr_slave_0 entered promiscuous mode [ 973.622595][ T6323] device hsr_slave_1 entered promiscuous mode [ 973.673995][ T6323] debugfs: Directory 'hsr0' with parent '/' already present! [ 973.717400][ T6323] bridge0: port 2(bridge_slave_1) entered blocking state [ 973.724553][ T6323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 973.731786][ T6323] bridge0: port 1(bridge_slave_0) entered blocking state [ 973.738932][ T6323] bridge0: port 1(bridge_slave_0) entered forwarding state 08:38:59 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:38:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) socket$vsock_stream(0x28, 0x1, 0x0) setresuid(0x0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000008c80)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000140)="e31b0ade652bbd1c0a742f712abc829eb8a4099261c10ea6bdb32b06fb7bd6f9e21e0ee297e013c7b7f84a1f01eaf4c9a050686d989155d9de777f0fe0c5b55ea039ab7f99c7923d9e22817f0b79cc8e205f6f9df6c4a0d900bbdf644cb5b28e76711da928a48e1d5347d3ac45", 0x6d}, {&(0x7f00000002c0)="bdcc816463ff65ba953c023d34e6dae6c08bf3f4ba7946443f7007f231a6edd0dd5447183e2293c0c95e6c93c20a9d38d7eb335e5db95ea1d7988e8ce1fc4e9cc4a1cd06cb48156764fc8e22bb30f3d9f1a26dab0db52b1f595a5516bab66044121c496e338fbbee62c33916e3ffc6520e01c140d65e0657d9b310105a6055fdf09f30874d52d5bc17125763426ffb698070ca64579ba466ee5dac6defbd879d9a6316b1335679eae9cc3f49b271097ec04329b818898f1dc6913fff825367a4478b93e7de77c5", 0xc7}, {&(0x7f0000000040)="decb72915b6c7cc2ab712945e5bab09a5d9e741f15081b762cb2af6c24adc8a5d54436e5e4075eb7816fd1284f45cbc7d3f42526dc8b05eadc2830", 0x3b}, {&(0x7f00000001c0)="83b3df1ed1257626982e73ba268bfe7989c30409fc0db7ff8cd67b3501704c5e02b987d9c389e02c995c98628cf1f8c9ac11dc7d7d938de91af0839b80ad09458d3d428ea63096d7ac6fbfcc12c3ead5764796f36993b18f3bf72dc13a1507fefa744cf3f27ea106d169d3d80f26dbf902", 0x71}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f00000003c0)="131500a017e9f471a520f26115b7131a6e5b25625e6a03cca52c3400018a952036d7dc2128dcb4336c6faae1824ef866100528573b2df6be1ae2d2393ad7994f0f28a0d55d69f39bd2b153e176982c65c5e92598b0e96e7f7ec609ed08c7e4080b097c4e1a9b35e3", 0x68}, {&(0x7f0000000480)="7e7f0bd706f56100fa9d25dccdbcc1886abb4425f9663cc0f83ccf8781d450b4e3b737ed556a25562a90bf23b67e00d6f258f770d19db46fd6c3c05864f313af1eb2fd8fd93f7dd4b76910769cf29d1ec4ba62a473336b0dba86c5d5d0dc49d03b2080993ee6a63e34fc26d96afaf9c3a549e7cc4d96", 0x76}, {&(0x7f0000000500)="b37ef511a1d7d6cd447fc0ab4f4db4631888d3e39fe9c24189e455447e6900319e509ec056d7ec3cae37d426aeadd7fa453b67ff74f399e27eae6acb41bc757fff32a7918d4ccffbfc223a7c4868f8dd4fe6911f9e6eef91995c9cff3d34c6b962a8f8", 0x63}], 0x8, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x68}}, {{&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x4}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000000680)="183af2bdb07a1b9717efc8dd22ba46eb20ddd60bdffead4325b5afd710f6b26e61a1be2983741df7391b243eb9c14b0b199df035ab9ea764685a6db9b97ed0cb5dfd6f589bdf6543dcabffd85dee3569b847241c04b9b5d8c3deec6e33f4d4a3fa6529eb61c93e8fbb0bd7636a490dc7e17f2cbde304d8a4001121a3d7a39a095e6a2102be40588cbef9a0a892a359f05af8644d3b534a930424e7431b13b658e63907f2d53826d7237c6f94c8cdefd231cbde9786b7c9650ab17b7e10f480e833998c8d0e72bc432cd31a4b8405daedfddd912d4b53e42869e4c45b13dd5e", 0xdf}, {&(0x7f0000000780)="9a34c82f4ad6009b0f93fd888db18214f8cf72dc13c37b214b545177150e8e4fb7b6b8801c85f5a7227e638c7e51de26d8f3ce63c9371640149bf76f58db5cd8dc7d86b5f122a4c9212ba3ebe9442ffebba99629834a9d2afa77b3334f2d803bc896717e35d28ebcc188f2cb6f449a351b8c7c4111f7666e85b0691b322682244ed051a2291ed4bbd42c52b212e594285a8fc83cd6d97dfd593a0df27b04bd14e6eb3ba0b6059ced551fa922fc7f", 0xae}, {&(0x7f0000000840)="1de999bfc5f5aa70", 0x8}, {&(0x7f0000000880)="373104ae7e954bd5204260500aeed16c1f9329f6a215c4256ebd0db4a3e20c019546bd9d487a6180a77fbc22b9aa762e47f05ccc39ffefb3a171a33a571fff37d11818a4c6f5976ae66cc834de929a082bafc4682449893ae8faca2a32b2736d1d2342861d4a753a33b56bd8f0622213e7e568244f681a681645c7d964639854006f0e42364d927a6a20b24064435bfa071bf7d80cf27a5f5469802590f81144e18a7308c09be74e93a1f0c648d70b94213b2abd252f1f863d189894ace989e9aa877e8cf3cb0798d928e72f4ca76baf075203582f2d", 0xd6}, {&(0x7f0000000980)="4fd38492e522042074865251dd03e5330ff5a23b12fb58fd94a2ae49918ae3041f6009a60e9d79ed597c3219a4fd4edd9b70f483cd51723ff07828ca834f00ade4214dbe3ee2a50f1af852e104de03b429c8e4170e2b1ac876c5e95a2b7f3a25a891dec5914e1138a55a7ecef73f48405f6b44e2eac259272c107cf20248e1fdea91af77f9a6516012e8cc5bf982b0120c7739bffa80623f4fef211ea3023e9f3e67e7560056a2fc1a7ef4b15edbd6ac4219e225e8697341fe4d9f6f82a076a2d304769c7821b92ef4ca920cd522c53655048fb98d809ff5649e6bd83378fb110ec33c1a9a", 0xe5}, {&(0x7f0000001ac0)="af8ae174deaf3c0b32c0bb120f76073a89ae5680c12fd1cfef69fbcb4417c48b642bdfd6b6e3c0218a18f4af35d00c48507242fbe8078730d03af019ef464a857ed06b45bb10c0b693db229198da0cbe878f98be95e50f46430af5a5ece98399c114c7f91c25791f819ff67911f0f58ba44253e1aa40b4dc3227221e2500a71e868babd495cb363fc195e6fd6eb34a91fa66639bb891fe0d3509dba71fc0fa8a2bda8f", 0xa3}], 0x6}}, {{&(0x7f0000001c00)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001c40)="f06d20c01b1ccbfc15a8fcec379c8024aabe5c612192cd2f9e9259e6b8f4", 0x1e}], 0x1, &(0x7f0000008e00)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x6e, 0x1, 0xf, [{@remote, 0x8}, {@loopback, 0x12a}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}]}, @timestamp={0x44, 0x20, 0x45, 0x0, 0x0, [0x3, 0x1, 0x2440, 0x80008000, 0x6, 0x7, 0x1]}, @noop, @timestamp={0x44, 0x1c, 0xc6, 0x0, 0x4, [0x7, 0x200, 0x7, 0x8, 0x2, 0x800]}, @cipso={0x86, 0xc, 0x2, [{0x2, 0x6, "9c1a44f4"}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x24, 0x18, 0x3, 0x4, [{@remote, 0x1}, {@loopback, 0x8001}, {@local, 0x6}, {@multicast1, 0x1}]}, @generic={0x82, 0xe, "a4ac0724a6c074274eefa0e7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x100}}, {{&(0x7f0000001dc0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002300)=[{&(0x7f0000001e00)="9be8a0a30e2c7f0799076e9a7e2a8da9f89200ea0354a513613d854d46abfada81ef75e0dcdcea8ec023d31a3604d72948e5c48c6ee546621bba49524f3a27b2e0df6744edd7b5b033e952dcb4945f5bc47d47679cd69416dde8ea71751b7fdcb088e15f51bfb8e75e462216373a3f31c28e3aedb2590a5eb88c0cea19643db3f6dfaa51850086372665f3089bb5310d881fa674c4e83a674589de6df6f8cc4660e06d13aa14490df4164d8c2e3168366d606f163427306656df48a8ec5db21d164527171092b0d44aa14c81990a3a988122bc0d439394449497feaea1293e9bb5d42755017cf1fbd7893e95e1e7b567aca85e61", 0xf4}, {&(0x7f0000001f80)="7c386cc044fec1ee527b64047c0c2c7a904e1f2f6231c15cd5cfa7a62833a6eb15eda84db2a474cf7a937b2bc2ffca4ec238da5d07ed3c250bca767a192330bd94ce74ff06415823fc29ef044b171abadc2e52fa0ae8353896652a7061aa50726e4232f787e6903b7f1cbf0872422ce9d1ee460d49ad11b9c942766c6a68dba1d8064fb442d652570b2dd73736d9e9f58a82624a694c3af60ae3947103383df42749a3ae43850db6562dc3aa0017d87c4154cc6d4a75d90203c6ad49617098f0df1dfed54e0c657495300c22a701efdc7ed40390c58f9ffcefcb4c4b33eceadc401b10231f8dbe29e6fdf89a05d92838a77f", 0xf2}, {&(0x7f0000002080)="df6f6964d9d4b4aa92384e41120fb3e0458ad476e15e3e1aba0f32d6b3d295e1dc818913d6e3eab4b802c7ded19cf87e8abacd7757533ce33cb50bb243abe07b25fb12e0168451c8dd44bf17de44a34f0d1f17c221dce08c10b761a2254339d1dba48d3e7a272cc680ec571955fea79ad5242ad37e05ce7e8e29580c75b1cc75", 0x80}, {&(0x7f0000001f00)="33121daa0cc7e73f4b0f739453f4a7ec3bb8b8564947526a61fbda69ea47ae7b9ff1f264a61c204c1145cbb49aa373ecd6e94ad85edaedee2811", 0x3a}, {&(0x7f0000002100)="d7e5697bd4752b47d7abee5a2a3f3de365f5b6b28ba70d9a2029804f263f150d884c9736246af9d4000c4d950ae1eeaa29cc53f2ce759dd034722203a60f18bfd5beccb105a36c5eed138f7d315e9b8079abb5c94547e75ebfdc4542575f9ce112aec0", 0x63}, {&(0x7f0000002180)="757241eb7689b5fb7a813f8e9e9f58fefbfa4669d7127f1e1d9188c5524e9a13617f77d1f99f4a415a82a56496c7b43eda5244ce4097a01cd98537c386c36a803ebce00334990ee6873793c9f608a27e", 0x50}, {&(0x7f0000002200)="fa7da6398560d85c31faf97b252e01257a3e45b4c36471e982eecdaf3edfa9d715a978266c7b818f1ab2b6b133d1797904e739d6fbe0ab436baaa58ff63d7bc0d6fd7a633fd59dcfdb0952015aac82af4d5c315b082366f31364853adde76d73c07ddda03788eaf41fbef929f8127576c201869edb82eb5fdf57c50e5ba1d3bef696d0f7554a3ae41fd736873f79d50e29996ba654529dcc8c15f974b0a483376a55e4499ea8105a7bae7c778fa858f7b0bc63402dada9478643f14ef9f877621e694b8c46c009213b7d6aeba332e7e423aaf322a33eab4fb1ab504635183aa7af7979cdd3c239f10ec9709b69e96d8b921052", 0xf3}], 0x7, &(0x7f0000002380)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}}}}], 0x68}}, {{&(0x7f0000002400)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002780)=[{&(0x7f0000002440)="550e0938c5c0f50e1483a6a392f017c7d05022832f5a26ef75d1408ab3107817f67cb8cc868c51586ce98e17b1d59d33928139ec381939a9a32d73ec858d593ec29fc410f48011e6262b148e8df06bb8ee38befbe1d5073a33037b2421badfb3657cb789fd6ca39f1088390976a11ead797e41021f748647abe35320535de8f493b8f17697dcfe3cf66a9ba38f8737b8c061ef6b259223a1009975da6da852b029ec0423e474dd1c659418e7b05195382c05b285e3d4457604", 0xb9}, {&(0x7f0000002500)="041eb6e0f6ee6080b78751b0876d7fa3050f2eec2ed35957295e59a3a9316eae03457506221122265b71d57f7367cab94c0fbc1e012983ee4fd14e5977d52ae6052f58718c9dc94daea60fdc6fafea0e38157f73b878f154443fec514ccdc711", 0x60}, {&(0x7f0000002580)="622dd9b38709b3858d808865558770be9203ec256e4e1f85a6fe4d44a9bf08adbd4334750ebb318c8ecc78a729486e3bae4f01ac4d49755016fd549bb58fa80418ff8cf13280295ee1ae131967e0c32508aa4f0402cdd1b5f9582763641412d8f26e4ad57c32f7536e11f9450ea3b8a233936167760230355e20c3d6843e82a919cc00dfc6f52f780f74c8648978018969f87e0d83f5a8af5b", 0x99}, {&(0x7f0000002640)="68ae2f9917c18a5219867384d6ec43a8ba5d456097f37b31f2c82861c91aab8e90e3ebf5be8ccd2f50524e0d9d449d2e9ea6cbd76b4805238f63b99f05f514588e2b2c5ebc4a672c05d0e70017be1bd7ee615958537188cfc496dec6b937018738ad073f29e6923a4c17", 0x6a}, {&(0x7f00000026c0)="d695f6", 0x3}, {&(0x7f0000002700)="70735c7d4f5da262c759f21a8c0405b91689682ef431d2d0b4876e09a47dc05e6180e17604f6b712086fc82cca9faa992790bd5839710e3e836499a3f72ea6a76fd5682210218da718d3b2ee9dcd7858da1b84621c8b8f1e2921e3e73f153ab2466b74a7370d956ca1f69c84e6cb9bfdf665d357725bf713175b89", 0x7b}], 0x6, &(0x7f0000002800)=[@ip_retopts={{0x24, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x44, [@multicast1, @rand_addr=0x4, @loopback, @loopback]}]}}}], 0x28}}, {{&(0x7f0000002840)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000002a40)=[{&(0x7f0000002880)="95028c718e0cba2fb94064fc184539f34fe4", 0x12}, {&(0x7f00000028c0)="c7645734b64e1d171ba3b51f7c3855e375ef0d36b9779c46f97b01574c28070341d6059a0dfb08e0c1648bc2fcec10da155d05b5127cdb0c173a4e41d109874be88f4e27b6a48d48dbf46dfd3fe963aa7170fd354443fa5c4a8293847fa3abce78e23bc1bdd3d914c1d718b3ec1d4403212a2b5d98f0aaac19cfed1dabc3b29dc7ee781eb23a03b5290cdf08aeac7db1fa8fd03261b5587640099caf1caa19d41235995c1844253d36ebde08aad06aaa14c4286f2891ff1de76f899fe9b5f23f21fb6e6f43ad2e39d7ac46667fa5", 0xce}, {&(0x7f00000029c0)="2a14b025eae10c79c23a2543bd7ceafadd18be2c57cd4968615e3feab2d4dba592a0e8474354f3e1be4b5d6a7ebf69e17bcc29ff4e08b4bb78cd55b75bf4f90425851b0a3a8ca0", 0x47}], 0x3, &(0x7f0000008b80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0xa, 0xffffffffffffffff, [{0x3, 0x4, "a9f9"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef87}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0xc0}}], 0x6, 0x600085c) 08:38:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000192e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:38:59 executing program 3: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 973.805632][ T6322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 973.908187][ T6322] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.135851][T28449] bridge0: port 1(bridge_slave_0) entered disabled state [ 974.149645][T28449] bridge0: port 2(bridge_slave_1) entered disabled state [ 974.175925][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 974.196225][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 974.218526][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 974.236519][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 974.461936][ T6337] 8021q: adding VLAN 0 to HW filter on device @ [ 974.502408][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 974.524138][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 974.542630][T28449] bridge0: port 1(bridge_slave_0) entered blocking state [ 974.549776][T28449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 974.590534][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 974.614695][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 974.632535][T28449] bridge0: port 2(bridge_slave_1) entered blocking state 08:39:00 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 974.639627][T28449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 974.666613][ T6323] 8021q: adding VLAN 0 to HW filter on device bond0 08:39:00 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 974.793360][ T6338] 8021q: adding VLAN 0 to HW filter on device @ 08:39:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000194e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 974.836828][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 974.847082][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 974.870560][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 974.930740][ T6323] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.968039][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 974.988714][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 975.013859][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 975.031501][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 975.054035][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 975.078551][ T6322] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 975.103390][ T6322] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 975.204790][ T6342] 8021q: adding VLAN 0 to HW filter on device @ [ 975.235445][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 975.252984][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 975.272247][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 975.281064][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 975.303211][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 975.311647][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 975.372263][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 975.379998][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 08:39:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000396e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 975.412679][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 975.421083][ T5751] bridge0: port 1(bridge_slave_0) entered blocking state [ 975.428203][ T5751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 975.482822][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 975.491678][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 975.528988][ T5751] bridge0: port 2(bridge_slave_1) entered blocking state [ 975.536094][ T5751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 975.544427][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 975.553436][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 975.563088][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 975.571801][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 975.581014][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 975.592567][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 975.602541][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 975.722835][ T6347] 8021q: adding VLAN 0 to HW filter on device @ [ 975.768668][ T6323] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 975.797202][ T6323] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 975.825442][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 975.838764][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 975.856303][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 975.866488][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 975.876405][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 975.885340][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 975.985790][ T6349] 8021q: adding VLAN 0 to HW filter on device @ [ 976.017317][ T6322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 976.071153][ T6323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 976.104798][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 976.113245][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 976.120854][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 976.175682][ T6350] IPVS: ftp: loaded support on port[0] = 21 [ 976.227966][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 976.246381][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 976.349256][ T6323] device veth0_vlan entered promiscuous mode [ 976.378239][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 976.393121][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 976.412690][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 976.421591][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 976.473573][ T6323] device veth1_vlan entered promiscuous mode [ 976.491630][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 976.503039][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 976.537955][ T6350] chnl_net:caif_netlink_parms(): no params data found [ 976.585993][ T6322] device veth0_vlan entered promiscuous mode [ 976.596630][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 976.605526][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 976.638072][ T6322] device veth1_vlan entered promiscuous mode [ 976.658489][ T6350] bridge0: port 1(bridge_slave_0) entered blocking state [ 976.680933][ T6350] bridge0: port 1(bridge_slave_0) entered disabled state [ 976.699928][ T6350] device bridge_slave_0 entered promiscuous mode [ 976.707734][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 976.721330][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 976.729197][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 976.748316][ T6369] IPVS: ftp: loaded support on port[0] = 21 [ 976.753670][ T6350] bridge0: port 2(bridge_slave_1) entered blocking state [ 976.763786][ T6350] bridge0: port 2(bridge_slave_1) entered disabled state [ 976.771623][ T6350] device bridge_slave_1 entered promiscuous mode [ 976.865333][ T6350] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 976.892858][ T2640] tipc: TX() has been purged, node left! [ 976.917834][ T6350] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 08:39:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a100002e2e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000194e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:02 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:02 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:02 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 977.202708][ T6378] 8021q: adding VLAN 0 to HW filter on device @ [ 977.215347][ T6350] team0: Port device team_slave_0 added [ 977.333266][ T6350] team0: Port device team_slave_1 added [ 977.418110][ T6380] 8021q: adding VLAN 0 to HW filter on device @ [ 977.446575][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 977.626881][ T6350] device hsr_slave_0 entered promiscuous mode [ 977.692446][ T6350] device hsr_slave_1 entered promiscuous mode [ 977.732099][ T6350] debugfs: Directory 'hsr0' with parent '/' already present! [ 977.739637][ T6369] chnl_net:caif_netlink_parms(): no params data found [ 977.820763][ T6385] IPVS: ftp: loaded support on port[0] = 21 [ 977.918594][ T6369] bridge0: port 1(bridge_slave_0) entered blocking state [ 977.929628][ T6369] bridge0: port 1(bridge_slave_0) entered disabled state [ 977.937867][ T6369] device bridge_slave_0 entered promiscuous mode [ 977.951025][ T6369] bridge0: port 2(bridge_slave_1) entered blocking state [ 977.958696][ T6369] bridge0: port 2(bridge_slave_1) entered disabled state [ 977.970030][ T6369] device bridge_slave_1 entered promiscuous mode [ 978.114812][ T6369] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 978.138221][ T6369] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 978.159731][ T6369] team0: Port device team_slave_0 added [ 978.168089][ T6369] team0: Port device team_slave_1 added [ 978.226062][ T6350] 8021q: adding VLAN 0 to HW filter on device bond0 [ 978.263887][ T6369] device hsr_slave_0 entered promiscuous mode [ 978.302430][ T6369] device hsr_slave_1 entered promiscuous mode [ 978.342151][ T6369] debugfs: Directory 'hsr0' with parent '/' already present! [ 978.357314][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 978.365187][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 978.391502][ T6385] chnl_net:caif_netlink_parms(): no params data found [ 978.414478][ T6350] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.443537][ T6385] bridge0: port 1(bridge_slave_0) entered blocking state [ 978.450699][ T6385] bridge0: port 1(bridge_slave_0) entered disabled state [ 978.458683][ T6385] device bridge_slave_0 entered promiscuous mode [ 978.467540][ T2640] device bridge_slave_1 left promiscuous mode [ 978.473830][ T2640] bridge0: port 2(bridge_slave_1) entered disabled state [ 978.522816][ T2640] device bridge_slave_0 left promiscuous mode [ 978.528980][ T2640] bridge0: port 1(bridge_slave_0) entered disabled state [ 978.574668][ T2640] device veth1_vlan left promiscuous mode [ 978.580488][ T2640] device veth0_vlan left promiscuous mode [ 979.462355][ T2640] device hsr_slave_0 left promiscuous mode [ 979.532242][ T2640] device hsr_slave_1 left promiscuous mode [ 979.601719][ T2640] team0 (unregistering): Port device team_slave_1 removed [ 979.612131][ T2640] team0 (unregistering): Port device team_slave_0 removed [ 979.622442][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 979.656143][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 979.714441][ T2640] bond0 (unregistering): Released all slaves [ 979.834896][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 979.843813][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 979.852025][ T8004] bridge0: port 1(bridge_slave_0) entered blocking state [ 979.859079][ T8004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 979.867288][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 979.876069][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 979.884370][ T8004] bridge0: port 2(bridge_slave_1) entered blocking state [ 979.891506][ T8004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 979.899342][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 979.907927][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 979.916646][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 979.925127][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 979.933858][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 979.942541][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 979.951017][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 979.959248][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 979.967459][ T6385] bridge0: port 2(bridge_slave_1) entered blocking state [ 979.977484][ T6385] bridge0: port 2(bridge_slave_1) entered disabled state [ 979.985329][ T6385] device bridge_slave_1 entered promiscuous mode [ 979.999189][ T6388] IPVS: ftp: loaded support on port[0] = 21 [ 980.010598][ T6350] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 980.021760][ T6350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 980.032415][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 980.040464][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 980.051429][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 980.060784][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 980.107303][ T6385] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 980.117556][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 980.127672][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 980.144365][ T6385] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 980.155254][ T6350] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 980.212886][ T6369] 8021q: adding VLAN 0 to HW filter on device bond0 [ 980.233279][ T6385] team0: Port device team_slave_0 added [ 980.240049][ T6385] team0: Port device team_slave_1 added [ 980.267059][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 980.278151][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 980.321384][ T6369] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.349452][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 980.361968][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 980.394456][ T6385] device hsr_slave_0 entered promiscuous mode [ 980.446084][ T6385] device hsr_slave_1 entered promiscuous mode [ 980.515292][ T6385] debugfs: Directory 'hsr0' with parent '/' already present! [ 980.546627][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 980.558776][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 980.567651][ T5751] bridge0: port 1(bridge_slave_0) entered blocking state [ 980.574729][ T5751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 980.587244][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 980.595911][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 980.608097][ T5751] bridge0: port 2(bridge_slave_1) entered blocking state [ 980.615164][ T5751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 980.626490][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 980.635391][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 980.648200][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 980.656777][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 980.665604][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 980.674173][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 980.692872][ T6388] chnl_net:caif_netlink_parms(): no params data found [ 980.701334][ T6350] device veth0_vlan entered promiscuous mode [ 980.712365][ T6369] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 980.723033][ T6369] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 980.738159][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 980.746690][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 980.754792][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 980.764322][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 980.773626][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 980.782005][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 980.790805][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 980.799141][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 980.807786][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 980.815673][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 980.823545][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 980.843112][ T6350] device veth1_vlan entered promiscuous mode [ 980.853942][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 980.876310][ T6369] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 980.897926][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 980.906525][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 980.940626][ T6388] bridge0: port 1(bridge_slave_0) entered blocking state [ 980.947970][ T6388] bridge0: port 1(bridge_slave_0) entered disabled state [ 980.973263][ T6388] device bridge_slave_0 entered promiscuous mode [ 980.980966][ T6388] bridge0: port 2(bridge_slave_1) entered blocking state [ 980.999490][ T6388] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.008050][ T6388] device bridge_slave_1 entered promiscuous mode [ 981.044971][ T6388] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 981.057727][ T6385] 8021q: adding VLAN 0 to HW filter on device bond0 [ 981.076536][ T6385] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.087262][ T6388] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 981.098317][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 981.124168][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 981.131919][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 981.140861][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 981.149723][T26499] bridge0: port 1(bridge_slave_0) entered blocking state [ 981.156786][T26499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 981.180741][ T6388] team0: Port device team_slave_0 added [ 981.187812][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 981.196554][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 981.209574][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 981.218434][T26499] bridge0: port 2(bridge_slave_1) entered blocking state [ 981.225510][T26499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 981.243131][ T6388] team0: Port device team_slave_1 added [ 981.264371][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 981.273655][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 981.283506][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 981.292321][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 981.300915][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 981.309725][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 981.319727][ T2640] tipc: TX() has been purged, node left! [ 981.400042][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 981.408415][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 981.418028][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 981.427188][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 981.435836][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 981.444244][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 981.452728][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 981.544301][ T6388] device hsr_slave_0 entered promiscuous mode [ 981.592602][ T6388] device hsr_slave_1 entered promiscuous mode [ 981.642259][ T6388] debugfs: Directory 'hsr0' with parent '/' already present! [ 981.657702][ T6369] device veth0_vlan entered promiscuous mode [ 981.714220][ T6385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 981.727934][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 981.736279][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 981.772183][ T6369] device veth1_vlan entered promiscuous mode [ 981.792173][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 981.800119][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 981.808132][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 981.816949][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 981.841164][ T6406] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 981.850876][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 08:39:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a100002e2e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000192e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a100000fde3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a100002e2e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 981.877321][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 981.899226][ T6385] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 982.197635][ T6417] 8021q: adding VLAN 0 to HW filter on device @ [ 982.436714][ T6422] 8021q: adding VLAN 0 to HW filter on device @ [ 982.471142][ T6388] 8021q: adding VLAN 0 to HW filter on device bond0 [ 982.579254][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 982.588600][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 982.601665][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 982.610418][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 982.624957][ T6388] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.726649][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 982.740011][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 982.762523][T26499] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.769626][T26499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 982.797939][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 982.818355][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 982.827158][T26499] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.834269][T26499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 982.842686][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 982.851883][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 982.861417][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 982.870258][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 982.881556][ T6385] device veth0_vlan entered promiscuous mode [ 982.941382][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 982.951335][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 982.961597][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 982.974460][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 982.985233][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 982.996938][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 983.007922][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 983.018701][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 983.028754][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 983.037614][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 983.046258][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 983.055265][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 983.065194][ T6388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 983.077919][ T2640] device bridge_slave_1 left promiscuous mode [ 983.084229][ T2640] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.123043][ T2640] device bridge_slave_0 left promiscuous mode [ 983.129302][ T2640] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.165027][ T2640] device veth1_vlan left promiscuous mode [ 983.170788][ T2640] device veth0_vlan left promiscuous mode [ 984.042381][ T2640] device hsr_slave_0 left promiscuous mode [ 984.092248][ T2640] device hsr_slave_1 left promiscuous mode [ 984.139028][ T2640] team0 (unregistering): Port device team_slave_1 removed [ 984.149950][ T2640] team0 (unregistering): Port device team_slave_0 removed [ 984.160132][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 984.225946][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 984.285880][ T2640] bond0 (unregistering): Released all slaves [ 984.393094][ T6388] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 984.403710][ T6385] device veth1_vlan entered promiscuous mode [ 984.415164][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 984.422900][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 984.441131][ T6429] IPVS: ftp: loaded support on port[0] = 21 [ 984.563676][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 984.576047][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 984.597899][ T6388] device veth0_vlan entered promiscuous mode 08:39:10 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 08:39:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2efe000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a100000fee3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 984.615244][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 984.624265][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 984.639170][ T6388] device veth1_vlan entered promiscuous mode [ 984.715088][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 984.723606][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 984.748851][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 08:39:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) sendmmsg$inet(r0, &(0x7f0000008c80)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000140)="e31b0ade652bbd1c0a742f712abc829eb8a4099261c10ea6bdb32b06fb7bd6f9e21e0ee297e013c7b7f84a1f01eaf4c9a050686d989155d9de777f0fe0c5b55ea039ab7f99c7923d9e22817f0b79cc8e205f6f9df6c4a0d900bbdf644cb5b28e76711da928a48e1d5347d3ac45", 0x6d}, {&(0x7f00000002c0)="bdcc816463ff65ba953c023d34e6dae6c08bf3f4ba7946443f7007f231a6edd0dd5447183e2293c0c95e6c93c20a9d38d7eb335e5db95ea1d7988e8ce1fc4e9cc4a1cd06cb48156764fc8e22bb30f3d9f1a26dab0db52b1f595a5516bab66044121c496e338fbbee62c33916e3ffc6520e01c140d65e0657d9b310105a6055fdf09f30874d52d5bc17125763426ffb698070ca64579ba466ee5dac6defbd879d9a6316b1335679eae9cc3f49b271097ec04329b818898f1dc6913fff825367a4478b93e7de77c5", 0xc7}, {&(0x7f0000000040)="decb72915b6c7cc2ab712945e5bab09a5d9e741f15081b762cb2af6c24adc8a5d54436e5e4075eb7816fd1284f45cbc7d3f42526dc8b05eadc2830", 0x3b}, {&(0x7f00000001c0)="83b3df1ed1257626982e73ba268bfe7989c30409fc0db7ff8cd67b3501704c5e02b987d9c389e02c995c98628cf1f8c9ac11dc7d7d938de91af0839b80ad09458d3d428ea63096d7ac6fbfcc12c3ead5764796f36993b18f3bf72dc13a1507fefa744cf3f27ea106d169d3d80f26dbf902", 0x71}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f00000003c0)="131500a017e9f471a520f26115b7131a6e5b25625e6a03cca52c3400018a952036d7dc2128dcb4336c6faae1824ef866100528573b2df6be1ae2d2393ad7994f0f28a0d55d69f39bd2b153e176982c65c5e92598b0e96e7f7ec609ed08c7e4080b097c4e1a9b35e3", 0x68}, {&(0x7f0000000480)="7e7f0bd706f56100fa9d25dccdbcc1886abb4425f9663cc0f83ccf8781d450b4e3b737ed556a25562a90bf23b67e00d6f258f770d19db46fd6c3c05864f313af1eb2fd8fd93f7dd4b76910769cf29d1ec4ba62a473336b0dba86c5d5d0dc49d03b2080993ee6a63e34fc26d96afaf9c3a549e7cc4d96", 0x76}, {&(0x7f0000000500)="b37ef511a1d7d6cd447fc0ab4f4db4631888d3e39fe9c24189e455447e6900319e509ec056d7ec3cae37d426aeadd7fa453b67ff74f399e27eae6acb41bc757fff32a7918d4ccffbfc223a7c4868f8dd4fe6911f9e6eef91995c9cff3d34c6b962a8f8", 0x63}], 0x8, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x68}}, {{&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x4}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000000680)="183af2bdb07a1b9717efc8dd22ba46eb20ddd60bdffead4325b5afd710f6b26e61a1be2983741df7391b243eb9c14b0b199df035ab9ea764685a6db9b97ed0cb5dfd6f589bdf6543dcabffd85dee3569b847241c04b9b5d8c3deec6e33f4d4a3fa6529eb61c93e8fbb0bd7636a490dc7e17f2cbde304d8a4001121a3d7a39a095e6a2102be40588cbef9a0a892a359f05af8644d3b534a930424e7431b13b658e63907f2d53826d7237c6f94c8cdefd231cbde9786b7c9650ab17b7e10f480e833998c8d0e72bc432cd31a4b8405daedfddd912d4b53e42869e4c45b13dd5e", 0xdf}, {&(0x7f0000000780)="9a34c82f4ad6009b0f93fd888db18214f8cf72dc13c37b214b545177150e8e4fb7b6b8801c85f5a7227e638c7e51de26d8f3ce63c9371640149bf76f58db5cd8dc7d86b5f122a4c9212ba3ebe9442ffebba99629834a9d2afa77b3334f2d803bc896717e35d28ebcc188f2cb6f449a351b8c7c4111f7666e85b0691b322682244ed051a2291ed4bbd42c52b212e594285a8fc83cd6d97dfd593a0df27b04bd14e6eb3ba0b6059ced551fa922fc7f", 0xae}, {&(0x7f0000000840)="1de999bfc5f5aa70", 0x8}, {&(0x7f0000000880)="373104ae7e954bd5204260500aeed16c1f9329f6a215c4256ebd0db4a3e20c019546bd9d487a6180a77fbc22b9aa762e47f05ccc39ffefb3a171a33a571fff37d11818a4c6f5976ae66cc834de929a082bafc4682449893ae8faca2a32b2736d1d2342861d4a753a33b56bd8f0622213e7e568244f681a681645c7d964639854006f0e42364d927a6a20b24064435bfa071bf7d80cf27a5f5469802590f81144e18a7308c09be74e93a1f0c648d70b94213b2abd252f1f863d189894ace989e9aa877e8cf3cb0798d928e72f4ca76baf075203582f2d", 0xd6}, {&(0x7f0000000980)="4fd38492e522042074865251dd03e5330ff5a23b12fb58fd94a2ae49918ae3041f6009a60e9d79ed597c3219a4fd4edd9b70f483cd51723ff07828ca834f00ade4214dbe3ee2a50f1af852e104de03b429c8e4170e2b1ac876c5e95a2b7f3a25a891dec5914e1138a55a7ecef73f48405f6b44e2eac259272c107cf20248e1fdea91af77f9a6516012e8cc5bf982b0120c7739bffa80623f4fef211ea3023e9f3e67e7560056a2fc1a7ef4b15edbd6ac4219e225e8697341fe4d9f6f82a076a2d304769c7821b92ef4ca920cd522c53655048fb98d809ff5649e6bd83378fb110ec33c1a9a", 0xe5}, {&(0x7f0000001ac0)="af8ae174deaf3c0b32c0bb120f76073a89ae5680c12fd1cfef69fbcb4417c48b642bdfd6b6e3c0218a18f4af35d00c48507242fbe8078730d03af019ef464a857ed06b45bb10c0b693db229198da0cbe878f98be95e50f46430af5a5ece98399c114c7f91c25791f819ff67911f0f58ba44253e1aa40b4dc3227221e2500a71e868babd495cb363fc195e6fd6eb34a91fa66639bb891fe0d3509dba71fc0fa8a2bda8f", 0xa3}], 0x6}}, {{&(0x7f0000001c00)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001c40)="f06d20c01b1ccbfc15a8fcec379c8024aabe5c612192cd2f9e9259e6b8f4", 0x1e}], 0x1, &(0x7f0000008e00)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x6e, 0x1, 0xf, [{@remote, 0x8}, {@loopback, 0x12a}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}]}, @timestamp={0x44, 0x20, 0x45, 0x0, 0x0, [0x3, 0x1, 0x2440, 0x80008000, 0x6, 0x7, 0x1]}, @noop, @timestamp={0x44, 0x1c, 0xc6, 0x0, 0x4, [0x7, 0x200, 0x7, 0x8, 0x2, 0x800]}, @cipso={0x86, 0xc, 0x2, [{0x2, 0x6, "9c1a44f4"}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x24, 0x18, 0x3, 0x4, [{@remote, 0x1}, {@loopback, 0x8001}, {@local, 0x6}, {@multicast1, 0x1}]}, @generic={0x82, 0xe, "a4ac0724a6c074274eefa0e7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x100}}, {{&(0x7f0000001dc0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002300)=[{&(0x7f0000001e00)="9be8a0a30e2c7f0799076e9a7e2a8da9f89200ea0354a513613d854d46abfada81ef75e0dcdcea8ec023d31a3604d72948e5c48c6ee546621bba49524f3a27b2e0df6744edd7b5b033e952dcb4945f5bc47d47679cd69416dde8ea71751b7fdcb088e15f51bfb8e75e462216373a3f31c28e3aedb2590a5eb88c0cea19643db3f6dfaa51850086372665f3089bb5310d881fa674c4e83a674589de6df6f8cc4660e06d13aa14490df4164d8c2e3168366d606f163427306656df48a8ec5db21d164527171092b0d44aa14c81990a3a988122bc0d439394449497feaea1293e9bb5d42755017cf1fbd7893e95e1e7b567aca85e61", 0xf4}, {&(0x7f0000001f80)="7c386cc044fec1ee527b64047c0c2c7a904e1f2f6231c15cd5cfa7a62833a6eb15eda84db2a474cf7a937b2bc2ffca4ec238da5d07ed3c250bca767a192330bd94ce74ff06415823fc29ef044b171abadc2e52fa0ae8353896652a7061aa50726e4232f787e6903b7f1cbf0872422ce9d1ee460d49ad11b9c942766c6a68dba1d8064fb442d652570b2dd73736d9e9f58a82624a694c3af60ae3947103383df42749a3ae43850db6562dc3aa0017d87c4154cc6d4a75d90203c6ad49617098f0df1dfed54e0c657495300c22a701efdc7ed40390c58f9ffcefcb4c4b33eceadc401b10231f8dbe29e6fdf89a05d92838a77f", 0xf2}, {&(0x7f0000002080)="df6f6964d9d4b4aa92384e41120fb3e0458ad476e15e3e1aba0f32d6b3d295e1dc818913d6e3eab4b802c7ded19cf87e8abacd7757533ce33cb50bb243abe07b25fb12e0168451c8dd44bf17de44a34f0d1f17c221dce08c10b761a2254339d1dba48d3e7a272cc680ec571955fea79ad5242ad37e05ce7e8e29580c75b1cc75", 0x80}, {&(0x7f0000001f00)="33121daa0cc7e73f4b0f739453f4a7ec3bb8b8564947526a61fbda69ea47ae7b9ff1f264a61c204c1145cbb49aa373ecd6e94ad85edaedee2811", 0x3a}, {&(0x7f0000002100)="d7e5697bd4752b47d7abee5a2a3f3de365f5b6b28ba70d9a2029804f263f150d884c9736246af9d4000c4d950ae1eeaa29cc53f2ce759dd034722203a60f18bfd5beccb105a36c5eed138f7d315e9b8079abb5c94547e75ebfdc4542575f9ce112aec0", 0x63}, {&(0x7f0000002180)="757241eb7689b5fb7a813f8e9e9f58fefbfa4669d7127f1e1d9188c5524e9a13617f77d1f99f4a415a82a56496c7b43eda5244ce4097a01cd98537c386c36a803ebce00334990ee6873793c9f608a27e", 0x50}, {&(0x7f0000002200)="fa7da6398560d85c31faf97b252e01257a3e45b4c36471e982eecdaf3edfa9d715a978266c7b818f1ab2b6b133d1797904e739d6fbe0ab436baaa58ff63d7bc0d6fd7a633fd59dcfdb0952015aac82af4d5c315b082366f31364853adde76d73c07ddda03788eaf41fbef929f8127576c201869edb82eb5fdf57c50e5ba1d3bef696d0f7554a3ae41fd736873f79d50e29996ba654529dcc8c15f974b0a483376a55e4499ea8105a7bae7c778fa858f7b0bc63402dada9478643f14ef9f877621e694b8c46c009213b7d6aeba332e7e423aaf322a33eab4fb1ab504635183aa7af7979cdd3c239f10ec9709b69e96d8b921052", 0xf3}], 0x7, &(0x7f0000002380)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}}}}], 0x68}}, {{&(0x7f0000002400)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002780)=[{&(0x7f0000002440)="550e0938c5c0f50e1483a6a392f017c7d05022832f5a26ef75d1408ab3107817f67cb8cc868c51586ce98e17b1d59d33928139ec381939a9a32d73ec858d593ec29fc410f48011e6262b148e8df06bb8ee38befbe1d5073a33037b2421badfb3657cb789fd6ca39f1088390976a11ead797e41021f748647abe35320535de8f493b8f17697dcfe3cf66a9ba38f8737b8c061ef6b259223a1009975da6da852b029ec0423e474dd1c659418e7b05195382c05b285e3d4457604", 0xb9}, {&(0x7f0000002500)="041eb6e0f6ee6080b78751b0876d7fa3050f2eec2ed35957295e59a3a9316eae03457506221122265b71d57f7367cab94c0fbc1e012983ee4fd14e5977d52ae6052f58718c9dc94daea60fdc6fafea0e38157f73b878f154443fec514ccdc711", 0x60}, {&(0x7f0000002580)="622dd9b38709b3858d808865558770be9203ec256e4e1f85a6fe4d44a9bf08adbd4334750ebb318c8ecc78a729486e3bae4f01ac4d49755016fd549bb58fa80418ff8cf13280295ee1ae131967e0c32508aa4f0402cdd1b5f9582763641412d8f26e4ad57c32f7536e11f9450ea3b8a233936167760230355e20c3d6843e82a919cc00dfc6f52f780f74c8648978018969f87e0d83f5a8af5b", 0x99}, {&(0x7f0000002640)="68ae2f9917c18a5219867384d6ec43a8ba5d456097f37b31f2c82861c91aab8e90e3ebf5be8ccd2f50524e0d9d449d2e9ea6cbd76b4805238f63b99f05f514588e2b2c5ebc4a672c05d0e70017be1bd7ee615958537188cfc496dec6b937018738ad073f29e6923a4c17", 0x6a}, {&(0x7f00000026c0)="d695f6", 0x3}, {&(0x7f0000002700)="70735c7d4f5da262c759f21a8c0405b91689682ef431d2d0b4876e09a47dc05e6180e17604f6b712086fc82cca9faa992790bd5839710e3e836499a3f72ea6a76fd5682210218da718d3b2ee9dcd7858da1b84621c8b8f1e2921e3e73f153ab2466b74a7370d956ca1f69c84e6cb9bfdf665d357725bf713175b89", 0x7b}], 0x6, &(0x7f0000002800)=[@ip_retopts={{0x24, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x44, [@multicast1, @rand_addr=0x4, @loopback, @loopback]}]}}}], 0x28}}, {{&(0x7f0000002840)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000002a40)=[{&(0x7f0000002880)="95028c718e0cba2fb94064fc184539f34fe4", 0x12}, {&(0x7f00000028c0)="c7645734b64e1d171ba3b51f7c3855e375ef0d36b9779c46f97b01574c28070341d6059a0dfb08e0c1648bc2fcec10da155d05b5127cdb0c173a4e41d109874be88f4e27b6a48d48dbf46dfd3fe963aa7170fd354443fa5c4a8293847fa3abce78e23bc1bdd3d914c1d718b3ec1d4403212a2b5d98f0aaac19cfed1dabc3b29dc7ee781eb23a03b5290cdf08aeac7db1fa8fd03261b5587640099caf1caa19d41235995c1844253d36ebde08aad06aaa14c4286f2891ff1de76f899fe9b5f23f21fb6e6f43ad2e39d7ac46667fa5", 0xce}, {&(0x7f00000029c0)="2a14b025eae10c79c23a2543bd7ceafadd18be2c57cd4968615e3feab2d4dba592a0e8474354f3e1be4b5d6a7ebf69e17bcc29ff4e08b4bb78cd55b75bf4f90425851b0a3a8ca0", 0x47}], 0x3, &(0x7f0000008b80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0xa, 0xffffffffffffffff, [{0x3, 0x4, "a9f9"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef87}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0xc0}}], 0x6, 0x600085c) 08:39:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) sendmmsg$inet(r0, &(0x7f0000008c80)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000140)="e31b0ade652bbd1c0a742f712abc829eb8a4099261c10ea6bdb32b06fb7bd6f9e21e0ee297e013c7b7f84a1f01eaf4c9a050686d989155d9de777f0fe0c5b55ea039ab7f99c7923d9e22817f0b79cc8e205f6f9df6c4a0d900bbdf644cb5b28e76711da928a48e1d5347d3ac45", 0x6d}, {&(0x7f00000002c0)="bdcc816463ff65ba953c023d34e6dae6c08bf3f4ba7946443f7007f231a6edd0dd5447183e2293c0c95e6c93c20a9d38d7eb335e5db95ea1d7988e8ce1fc4e9cc4a1cd06cb48156764fc8e22bb30f3d9f1a26dab0db52b1f595a5516bab66044121c496e338fbbee62c33916e3ffc6520e01c140d65e0657d9b310105a6055fdf09f30874d52d5bc17125763426ffb698070ca64579ba466ee5dac6defbd879d9a6316b1335679eae9cc3f49b271097ec04329b818898f1dc6913fff825367a4478b93e7de77c5", 0xc7}, {&(0x7f0000000040)="decb72915b6c7cc2ab712945e5bab09a5d9e741f15081b762cb2af6c24adc8a5d54436e5e4075eb7816fd1284f45cbc7d3f42526dc8b05eadc2830", 0x3b}, {&(0x7f00000001c0)="83b3df1ed1257626982e73ba268bfe7989c30409fc0db7ff8cd67b3501704c5e02b987d9c389e02c995c98628cf1f8c9ac11dc7d7d938de91af0839b80ad09458d3d428ea63096d7ac6fbfcc12c3ead5764796f36993b18f3bf72dc13a1507fefa744cf3f27ea106d169d3d80f26dbf902", 0x71}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f00000003c0)="131500a017e9f471a520f26115b7131a6e5b25625e6a03cca52c3400018a952036d7dc2128dcb4336c6faae1824ef866100528573b2df6be1ae2d2393ad7994f0f28a0d55d69f39bd2b153e176982c65c5e92598b0e96e7f7ec609ed08c7e4080b097c4e1a9b35e3", 0x68}, {&(0x7f0000000480)="7e7f0bd706f56100fa9d25dccdbcc1886abb4425f9663cc0f83ccf8781d450b4e3b737ed556a25562a90bf23b67e00d6f258f770d19db46fd6c3c05864f313af1eb2fd8fd93f7dd4b76910769cf29d1ec4ba62a473336b0dba86c5d5d0dc49d03b2080993ee6a63e34fc26d96afaf9c3a549e7cc4d96", 0x76}, {&(0x7f0000000500)="b37ef511a1d7d6cd447fc0ab4f4db4631888d3e39fe9c24189e455447e6900319e509ec056d7ec3cae37d426aeadd7fa453b67ff74f399e27eae6acb41bc757fff32a7918d4ccffbfc223a7c4868f8dd4fe6911f9e6eef91995c9cff3d34c6b962a8f8", 0x63}], 0x8, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x68}}, {{&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x4}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000000680)="183af2bdb07a1b9717efc8dd22ba46eb20ddd60bdffead4325b5afd710f6b26e61a1be2983741df7391b243eb9c14b0b199df035ab9ea764685a6db9b97ed0cb5dfd6f589bdf6543dcabffd85dee3569b847241c04b9b5d8c3deec6e33f4d4a3fa6529eb61c93e8fbb0bd7636a490dc7e17f2cbde304d8a4001121a3d7a39a095e6a2102be40588cbef9a0a892a359f05af8644d3b534a930424e7431b13b658e63907f2d53826d7237c6f94c8cdefd231cbde9786b7c9650ab17b7e10f480e833998c8d0e72bc432cd31a4b8405daedfddd912d4b53e42869e4c45b13dd5e", 0xdf}, {&(0x7f0000000780)="9a34c82f4ad6009b0f93fd888db18214f8cf72dc13c37b214b545177150e8e4fb7b6b8801c85f5a7227e638c7e51de26d8f3ce63c9371640149bf76f58db5cd8dc7d86b5f122a4c9212ba3ebe9442ffebba99629834a9d2afa77b3334f2d803bc896717e35d28ebcc188f2cb6f449a351b8c7c4111f7666e85b0691b322682244ed051a2291ed4bbd42c52b212e594285a8fc83cd6d97dfd593a0df27b04bd14e6eb3ba0b6059ced551fa922fc7f", 0xae}, {&(0x7f0000000840)="1de999bfc5f5aa70", 0x8}, {&(0x7f0000000880)="373104ae7e954bd5204260500aeed16c1f9329f6a215c4256ebd0db4a3e20c019546bd9d487a6180a77fbc22b9aa762e47f05ccc39ffefb3a171a33a571fff37d11818a4c6f5976ae66cc834de929a082bafc4682449893ae8faca2a32b2736d1d2342861d4a753a33b56bd8f0622213e7e568244f681a681645c7d964639854006f0e42364d927a6a20b24064435bfa071bf7d80cf27a5f5469802590f81144e18a7308c09be74e93a1f0c648d70b94213b2abd252f1f863d189894ace989e9aa877e8cf3cb0798d928e72f4ca76baf075203582f2d", 0xd6}, {&(0x7f0000000980)="4fd38492e522042074865251dd03e5330ff5a23b12fb58fd94a2ae49918ae3041f6009a60e9d79ed597c3219a4fd4edd9b70f483cd51723ff07828ca834f00ade4214dbe3ee2a50f1af852e104de03b429c8e4170e2b1ac876c5e95a2b7f3a25a891dec5914e1138a55a7ecef73f48405f6b44e2eac259272c107cf20248e1fdea91af77f9a6516012e8cc5bf982b0120c7739bffa80623f4fef211ea3023e9f3e67e7560056a2fc1a7ef4b15edbd6ac4219e225e8697341fe4d9f6f82a076a2d304769c7821b92ef4ca920cd522c53655048fb98d809ff5649e6bd83378fb110ec33c1a9a", 0xe5}, {&(0x7f0000001ac0)="af8ae174deaf3c0b32c0bb120f76073a89ae5680c12fd1cfef69fbcb4417c48b642bdfd6b6e3c0218a18f4af35d00c48507242fbe8078730d03af019ef464a857ed06b45bb10c0b693db229198da0cbe878f98be95e50f46430af5a5ece98399c114c7f91c25791f819ff67911f0f58ba44253e1aa40b4dc3227221e2500a71e868babd495cb363fc195e6fd6eb34a91fa66639bb891fe0d3509dba71fc0fa8a2bda8f", 0xa3}], 0x6}}, {{&(0x7f0000001c00)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001c40)="f06d20c01b1ccbfc15a8fcec379c8024aabe5c612192cd2f9e9259e6b8f4", 0x1e}], 0x1, &(0x7f0000008e00)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x6e, 0x1, 0xf, [{@remote, 0x8}, {@loopback, 0x12a}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}]}, @timestamp={0x44, 0x20, 0x45, 0x0, 0x0, [0x3, 0x1, 0x2440, 0x80008000, 0x6, 0x7, 0x1]}, @noop, @timestamp={0x44, 0x1c, 0xc6, 0x0, 0x4, [0x7, 0x200, 0x7, 0x8, 0x2, 0x800]}, @cipso={0x86, 0xc, 0x2, [{0x2, 0x6, "9c1a44f4"}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x24, 0x18, 0x3, 0x4, [{@remote, 0x1}, {@loopback, 0x8001}, {@local, 0x6}, {@multicast1, 0x1}]}, @generic={0x82, 0xe, "a4ac0724a6c074274eefa0e7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x100}}, {{&(0x7f0000001dc0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002300)=[{&(0x7f0000001e00)="9be8a0a30e2c7f0799076e9a7e2a8da9f89200ea0354a513613d854d46abfada81ef75e0dcdcea8ec023d31a3604d72948e5c48c6ee546621bba49524f3a27b2e0df6744edd7b5b033e952dcb4945f5bc47d47679cd69416dde8ea71751b7fdcb088e15f51bfb8e75e462216373a3f31c28e3aedb2590a5eb88c0cea19643db3f6dfaa51850086372665f3089bb5310d881fa674c4e83a674589de6df6f8cc4660e06d13aa14490df4164d8c2e3168366d606f163427306656df48a8ec5db21d164527171092b0d44aa14c81990a3a988122bc0d439394449497feaea1293e9bb5d42755017cf1fbd7893e95e1e7b567aca85e61", 0xf4}, {&(0x7f0000001f80)="7c386cc044fec1ee527b64047c0c2c7a904e1f2f6231c15cd5cfa7a62833a6eb15eda84db2a474cf7a937b2bc2ffca4ec238da5d07ed3c250bca767a192330bd94ce74ff06415823fc29ef044b171abadc2e52fa0ae8353896652a7061aa50726e4232f787e6903b7f1cbf0872422ce9d1ee460d49ad11b9c942766c6a68dba1d8064fb442d652570b2dd73736d9e9f58a82624a694c3af60ae3947103383df42749a3ae43850db6562dc3aa0017d87c4154cc6d4a75d90203c6ad49617098f0df1dfed54e0c657495300c22a701efdc7ed40390c58f9ffcefcb4c4b33eceadc401b10231f8dbe29e6fdf89a05d92838a77f", 0xf2}, {&(0x7f0000002080)="df6f6964d9d4b4aa92384e41120fb3e0458ad476e15e3e1aba0f32d6b3d295e1dc818913d6e3eab4b802c7ded19cf87e8abacd7757533ce33cb50bb243abe07b25fb12e0168451c8dd44bf17de44a34f0d1f17c221dce08c10b761a2254339d1dba48d3e7a272cc680ec571955fea79ad5242ad37e05ce7e8e29580c75b1cc75", 0x80}, {&(0x7f0000001f00)="33121daa0cc7e73f4b0f739453f4a7ec3bb8b8564947526a61fbda69ea47ae7b9ff1f264a61c204c1145cbb49aa373ecd6e94ad85edaedee2811", 0x3a}, {&(0x7f0000002100)="d7e5697bd4752b47d7abee5a2a3f3de365f5b6b28ba70d9a2029804f263f150d884c9736246af9d4000c4d950ae1eeaa29cc53f2ce759dd034722203a60f18bfd5beccb105a36c5eed138f7d315e9b8079abb5c94547e75ebfdc4542575f9ce112aec0", 0x63}, {&(0x7f0000002180)="757241eb7689b5fb7a813f8e9e9f58fefbfa4669d7127f1e1d9188c5524e9a13617f77d1f99f4a415a82a56496c7b43eda5244ce4097a01cd98537c386c36a803ebce00334990ee6873793c9f608a27e", 0x50}, {&(0x7f0000002200)="fa7da6398560d85c31faf97b252e01257a3e45b4c36471e982eecdaf3edfa9d715a978266c7b818f1ab2b6b133d1797904e739d6fbe0ab436baaa58ff63d7bc0d6fd7a633fd59dcfdb0952015aac82af4d5c315b082366f31364853adde76d73c07ddda03788eaf41fbef929f8127576c201869edb82eb5fdf57c50e5ba1d3bef696d0f7554a3ae41fd736873f79d50e29996ba654529dcc8c15f974b0a483376a55e4499ea8105a7bae7c778fa858f7b0bc63402dada9478643f14ef9f877621e694b8c46c009213b7d6aeba332e7e423aaf322a33eab4fb1ab504635183aa7af7979cdd3c239f10ec9709b69e96d8b921052", 0xf3}], 0x7, &(0x7f0000002380)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}}}}], 0x68}}, {{&(0x7f0000002400)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002780)=[{&(0x7f0000002440)="550e0938c5c0f50e1483a6a392f017c7d05022832f5a26ef75d1408ab3107817f67cb8cc868c51586ce98e17b1d59d33928139ec381939a9a32d73ec858d593ec29fc410f48011e6262b148e8df06bb8ee38befbe1d5073a33037b2421badfb3657cb789fd6ca39f1088390976a11ead797e41021f748647abe35320535de8f493b8f17697dcfe3cf66a9ba38f8737b8c061ef6b259223a1009975da6da852b029ec0423e474dd1c659418e7b05195382c05b285e3d4457604", 0xb9}, {&(0x7f0000002500)="041eb6e0f6ee6080b78751b0876d7fa3050f2eec2ed35957295e59a3a9316eae03457506221122265b71d57f7367cab94c0fbc1e012983ee4fd14e5977d52ae6052f58718c9dc94daea60fdc6fafea0e38157f73b878f154443fec514ccdc711", 0x60}, {&(0x7f0000002580)="622dd9b38709b3858d808865558770be9203ec256e4e1f85a6fe4d44a9bf08adbd4334750ebb318c8ecc78a729486e3bae4f01ac4d49755016fd549bb58fa80418ff8cf13280295ee1ae131967e0c32508aa4f0402cdd1b5f9582763641412d8f26e4ad57c32f7536e11f9450ea3b8a233936167760230355e20c3d6843e82a919cc00dfc6f52f780f74c8648978018969f87e0d83f5a8af5b", 0x99}, {&(0x7f0000002640)="68ae2f9917c18a5219867384d6ec43a8ba5d456097f37b31f2c82861c91aab8e90e3ebf5be8ccd2f50524e0d9d449d2e9ea6cbd76b4805238f63b99f05f514588e2b2c5ebc4a672c05d0e70017be1bd7ee615958537188cfc496dec6b937018738ad073f29e6923a4c17", 0x6a}, {&(0x7f00000026c0)="d695f6", 0x3}, {&(0x7f0000002700)="70735c7d4f5da262c759f21a8c0405b91689682ef431d2d0b4876e09a47dc05e6180e17604f6b712086fc82cca9faa992790bd5839710e3e836499a3f72ea6a76fd5682210218da718d3b2ee9dcd7858da1b84621c8b8f1e2921e3e73f153ab2466b74a7370d956ca1f69c84e6cb9bfdf665d357725bf713175b89", 0x7b}], 0x6, &(0x7f0000002800)=[@ip_retopts={{0x24, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x44, [@multicast1, @rand_addr=0x4, @loopback, @loopback]}]}}}], 0x28}}, {{&(0x7f0000002840)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000002a40)=[{&(0x7f0000002880)="95028c718e0cba2fb94064fc184539f34fe4", 0x12}, {&(0x7f00000028c0)="c7645734b64e1d171ba3b51f7c3855e375ef0d36b9779c46f97b01574c28070341d6059a0dfb08e0c1648bc2fcec10da155d05b5127cdb0c173a4e41d109874be88f4e27b6a48d48dbf46dfd3fe963aa7170fd354443fa5c4a8293847fa3abce78e23bc1bdd3d914c1d718b3ec1d4403212a2b5d98f0aaac19cfed1dabc3b29dc7ee781eb23a03b5290cdf08aeac7db1fa8fd03261b5587640099caf1caa19d41235995c1844253d36ebde08aad06aaa14c4286f2891ff1de76f899fe9b5f23f21fb6e6f43ad2e39d7ac46667fa5", 0xce}, {&(0x7f00000029c0)="2a14b025eae10c79c23a2543bd7ceafadd18be2c57cd4968615e3feab2d4dba592a0e8474354f3e1be4b5d6a7ebf69e17bcc29ff4e08b4bb78cd55b75bf4f90425851b0a3a8ca0", 0x47}], 0x3, &(0x7f0000008b80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0xa, 0xffffffffffffffff, [{0x3, 0x4, "a9f9"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef87}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0xc0}}], 0x6, 0x600085c) 08:39:10 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:10 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 985.021526][ T6445] 8021q: adding VLAN 0 to HW filter on device @ [ 985.060682][ T6429] chnl_net:caif_netlink_parms(): no params data found [ 985.117352][ T6456] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:39:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000002e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:10 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:10 executing program 2: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 985.207056][ T6429] bridge0: port 1(bridge_slave_0) entered blocking state [ 985.272103][ T6429] bridge0: port 1(bridge_slave_0) entered disabled state [ 985.318655][ T6429] device bridge_slave_0 entered promiscuous mode [ 985.687380][ T6429] bridge0: port 2(bridge_slave_1) entered blocking state [ 985.694533][ T6429] bridge0: port 2(bridge_slave_1) entered disabled state [ 985.726905][ T6429] device bridge_slave_1 entered promiscuous mode [ 985.740080][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 985.955191][ T6429] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 986.005076][ T6429] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 986.075672][ T6429] team0: Port device team_slave_0 added [ 986.093853][ T6429] team0: Port device team_slave_1 added [ 986.174690][ T6429] device hsr_slave_0 entered promiscuous mode [ 986.232488][ T6429] device hsr_slave_1 entered promiscuous mode [ 986.272140][ T6429] debugfs: Directory 'hsr0' with parent '/' already present! [ 986.333786][ T6429] 8021q: adding VLAN 0 to HW filter on device bond0 [ 986.346565][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 986.357605][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 986.365400][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 986.375465][ T6429] 8021q: adding VLAN 0 to HW filter on device team0 [ 986.388293][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 986.398025][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 986.406537][ T5781] bridge0: port 1(bridge_slave_0) entered blocking state [ 986.413625][ T5781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 986.422144][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 986.434786][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 986.443865][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 986.452663][ T6071] bridge0: port 2(bridge_slave_1) entered blocking state [ 986.459743][ T6071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 986.468320][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 986.484375][ T2640] tipc: TX() has been purged, node left! [ 986.491726][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 986.500319][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 986.517335][ T6429] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 986.527944][ T6429] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 986.540594][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 986.548496][ T2640] tipc: TX() has been purged, node left! [ 986.549879][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 986.562822][ T2640] tipc: TX() has been purged, node left! [ 986.563343][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 986.576615][ T2640] tipc: TX() has been purged, node left! [ 986.586483][ T6429] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 986.593939][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 986.601698][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 986.609451][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 986.664366][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 986.673422][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 986.682423][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 986.690394][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 986.700108][ T6429] device veth0_vlan entered promiscuous mode [ 986.711026][ T6429] device veth1_vlan entered promiscuous mode [ 986.742233][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 986.750556][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 08:39:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) sendmmsg$inet(r0, &(0x7f0000008c80)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000140)="e31b0ade652bbd1c0a742f712abc829eb8a4099261c10ea6bdb32b06fb7bd6f9e21e0ee297e013c7b7f84a1f01eaf4c9a050686d989155d9de777f0fe0c5b55ea039ab7f99c7923d9e22817f0b79cc8e205f6f9df6c4a0d900bbdf644cb5b28e76711da928a48e1d5347d3ac45", 0x6d}, {&(0x7f00000002c0)="bdcc816463ff65ba953c023d34e6dae6c08bf3f4ba7946443f7007f231a6edd0dd5447183e2293c0c95e6c93c20a9d38d7eb335e5db95ea1d7988e8ce1fc4e9cc4a1cd06cb48156764fc8e22bb30f3d9f1a26dab0db52b1f595a5516bab66044121c496e338fbbee62c33916e3ffc6520e01c140d65e0657d9b310105a6055fdf09f30874d52d5bc17125763426ffb698070ca64579ba466ee5dac6defbd879d9a6316b1335679eae9cc3f49b271097ec04329b818898f1dc6913fff825367a4478b93e7de77c5", 0xc7}, {&(0x7f0000000040)="decb72915b6c7cc2ab712945e5bab09a5d9e741f15081b762cb2af6c24adc8a5d54436e5e4075eb7816fd1284f45cbc7d3f42526dc8b05eadc2830", 0x3b}, {&(0x7f00000001c0)="83b3df1ed1257626982e73ba268bfe7989c30409fc0db7ff8cd67b3501704c5e02b987d9c389e02c995c98628cf1f8c9ac11dc7d7d938de91af0839b80ad09458d3d428ea63096d7ac6fbfcc12c3ead5764796f36993b18f3bf72dc13a1507fefa744cf3f27ea106d169d3d80f26dbf902", 0x71}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f00000003c0)="131500a017e9f471a520f26115b7131a6e5b25625e6a03cca52c3400018a952036d7dc2128dcb4336c6faae1824ef866100528573b2df6be1ae2d2393ad7994f0f28a0d55d69f39bd2b153e176982c65c5e92598b0e96e7f7ec609ed08c7e4080b097c4e1a9b35e3", 0x68}, {&(0x7f0000000480)="7e7f0bd706f56100fa9d25dccdbcc1886abb4425f9663cc0f83ccf8781d450b4e3b737ed556a25562a90bf23b67e00d6f258f770d19db46fd6c3c05864f313af1eb2fd8fd93f7dd4b76910769cf29d1ec4ba62a473336b0dba86c5d5d0dc49d03b2080993ee6a63e34fc26d96afaf9c3a549e7cc4d96", 0x76}, {&(0x7f0000000500)="b37ef511a1d7d6cd447fc0ab4f4db4631888d3e39fe9c24189e455447e6900319e509ec056d7ec3cae37d426aeadd7fa453b67ff74f399e27eae6acb41bc757fff32a7918d4ccffbfc223a7c4868f8dd4fe6911f9e6eef91995c9cff3d34c6b962a8f8", 0x63}], 0x8, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x68}}, {{&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x4}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000000680)="183af2bdb07a1b9717efc8dd22ba46eb20ddd60bdffead4325b5afd710f6b26e61a1be2983741df7391b243eb9c14b0b199df035ab9ea764685a6db9b97ed0cb5dfd6f589bdf6543dcabffd85dee3569b847241c04b9b5d8c3deec6e33f4d4a3fa6529eb61c93e8fbb0bd7636a490dc7e17f2cbde304d8a4001121a3d7a39a095e6a2102be40588cbef9a0a892a359f05af8644d3b534a930424e7431b13b658e63907f2d53826d7237c6f94c8cdefd231cbde9786b7c9650ab17b7e10f480e833998c8d0e72bc432cd31a4b8405daedfddd912d4b53e42869e4c45b13dd5e", 0xdf}, {&(0x7f0000000780)="9a34c82f4ad6009b0f93fd888db18214f8cf72dc13c37b214b545177150e8e4fb7b6b8801c85f5a7227e638c7e51de26d8f3ce63c9371640149bf76f58db5cd8dc7d86b5f122a4c9212ba3ebe9442ffebba99629834a9d2afa77b3334f2d803bc896717e35d28ebcc188f2cb6f449a351b8c7c4111f7666e85b0691b322682244ed051a2291ed4bbd42c52b212e594285a8fc83cd6d97dfd593a0df27b04bd14e6eb3ba0b6059ced551fa922fc7f", 0xae}, {&(0x7f0000000840)="1de999bfc5f5aa70", 0x8}, {&(0x7f0000000880)="373104ae7e954bd5204260500aeed16c1f9329f6a215c4256ebd0db4a3e20c019546bd9d487a6180a77fbc22b9aa762e47f05ccc39ffefb3a171a33a571fff37d11818a4c6f5976ae66cc834de929a082bafc4682449893ae8faca2a32b2736d1d2342861d4a753a33b56bd8f0622213e7e568244f681a681645c7d964639854006f0e42364d927a6a20b24064435bfa071bf7d80cf27a5f5469802590f81144e18a7308c09be74e93a1f0c648d70b94213b2abd252f1f863d189894ace989e9aa877e8cf3cb0798d928e72f4ca76baf075203582f2d", 0xd6}, {&(0x7f0000000980)="4fd38492e522042074865251dd03e5330ff5a23b12fb58fd94a2ae49918ae3041f6009a60e9d79ed597c3219a4fd4edd9b70f483cd51723ff07828ca834f00ade4214dbe3ee2a50f1af852e104de03b429c8e4170e2b1ac876c5e95a2b7f3a25a891dec5914e1138a55a7ecef73f48405f6b44e2eac259272c107cf20248e1fdea91af77f9a6516012e8cc5bf982b0120c7739bffa80623f4fef211ea3023e9f3e67e7560056a2fc1a7ef4b15edbd6ac4219e225e8697341fe4d9f6f82a076a2d304769c7821b92ef4ca920cd522c53655048fb98d809ff5649e6bd83378fb110ec33c1a9a", 0xe5}, {&(0x7f0000001ac0)="af8ae174deaf3c0b32c0bb120f76073a89ae5680c12fd1cfef69fbcb4417c48b642bdfd6b6e3c0218a18f4af35d00c48507242fbe8078730d03af019ef464a857ed06b45bb10c0b693db229198da0cbe878f98be95e50f46430af5a5ece98399c114c7f91c25791f819ff67911f0f58ba44253e1aa40b4dc3227221e2500a71e868babd495cb363fc195e6fd6eb34a91fa66639bb891fe0d3509dba71fc0fa8a2bda8f", 0xa3}], 0x6}}, {{&(0x7f0000001c00)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001c40)="f06d20c01b1ccbfc15a8fcec379c8024aabe5c612192cd2f9e9259e6b8f4", 0x1e}], 0x1, &(0x7f0000008e00)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x6e, 0x1, 0xf, [{@remote, 0x8}, {@loopback, 0x12a}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}]}, @timestamp={0x44, 0x20, 0x45, 0x0, 0x0, [0x3, 0x1, 0x2440, 0x80008000, 0x6, 0x7, 0x1]}, @noop, @timestamp={0x44, 0x1c, 0xc6, 0x0, 0x4, [0x7, 0x200, 0x7, 0x8, 0x2, 0x800]}, @cipso={0x86, 0xc, 0x2, [{0x2, 0x6, "9c1a44f4"}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x24, 0x18, 0x3, 0x4, [{@remote, 0x1}, {@loopback, 0x8001}, {@local, 0x6}, {@multicast1, 0x1}]}, @generic={0x82, 0xe, "a4ac0724a6c074274eefa0e7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x100}}, {{&(0x7f0000001dc0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002300)=[{&(0x7f0000001e00)="9be8a0a30e2c7f0799076e9a7e2a8da9f89200ea0354a513613d854d46abfada81ef75e0dcdcea8ec023d31a3604d72948e5c48c6ee546621bba49524f3a27b2e0df6744edd7b5b033e952dcb4945f5bc47d47679cd69416dde8ea71751b7fdcb088e15f51bfb8e75e462216373a3f31c28e3aedb2590a5eb88c0cea19643db3f6dfaa51850086372665f3089bb5310d881fa674c4e83a674589de6df6f8cc4660e06d13aa14490df4164d8c2e3168366d606f163427306656df48a8ec5db21d164527171092b0d44aa14c81990a3a988122bc0d439394449497feaea1293e9bb5d42755017cf1fbd7893e95e1e7b567aca85e61", 0xf4}, {&(0x7f0000001f80)="7c386cc044fec1ee527b64047c0c2c7a904e1f2f6231c15cd5cfa7a62833a6eb15eda84db2a474cf7a937b2bc2ffca4ec238da5d07ed3c250bca767a192330bd94ce74ff06415823fc29ef044b171abadc2e52fa0ae8353896652a7061aa50726e4232f787e6903b7f1cbf0872422ce9d1ee460d49ad11b9c942766c6a68dba1d8064fb442d652570b2dd73736d9e9f58a82624a694c3af60ae3947103383df42749a3ae43850db6562dc3aa0017d87c4154cc6d4a75d90203c6ad49617098f0df1dfed54e0c657495300c22a701efdc7ed40390c58f9ffcefcb4c4b33eceadc401b10231f8dbe29e6fdf89a05d92838a77f", 0xf2}, {&(0x7f0000002080)="df6f6964d9d4b4aa92384e41120fb3e0458ad476e15e3e1aba0f32d6b3d295e1dc818913d6e3eab4b802c7ded19cf87e8abacd7757533ce33cb50bb243abe07b25fb12e0168451c8dd44bf17de44a34f0d1f17c221dce08c10b761a2254339d1dba48d3e7a272cc680ec571955fea79ad5242ad37e05ce7e8e29580c75b1cc75", 0x80}, {&(0x7f0000001f00)="33121daa0cc7e73f4b0f739453f4a7ec3bb8b8564947526a61fbda69ea47ae7b9ff1f264a61c204c1145cbb49aa373ecd6e94ad85edaedee2811", 0x3a}, {&(0x7f0000002100)="d7e5697bd4752b47d7abee5a2a3f3de365f5b6b28ba70d9a2029804f263f150d884c9736246af9d4000c4d950ae1eeaa29cc53f2ce759dd034722203a60f18bfd5beccb105a36c5eed138f7d315e9b8079abb5c94547e75ebfdc4542575f9ce112aec0", 0x63}, {&(0x7f0000002180)="757241eb7689b5fb7a813f8e9e9f58fefbfa4669d7127f1e1d9188c5524e9a13617f77d1f99f4a415a82a56496c7b43eda5244ce4097a01cd98537c386c36a803ebce00334990ee6873793c9f608a27e", 0x50}, {&(0x7f0000002200)="fa7da6398560d85c31faf97b252e01257a3e45b4c36471e982eecdaf3edfa9d715a978266c7b818f1ab2b6b133d1797904e739d6fbe0ab436baaa58ff63d7bc0d6fd7a633fd59dcfdb0952015aac82af4d5c315b082366f31364853adde76d73c07ddda03788eaf41fbef929f8127576c201869edb82eb5fdf57c50e5ba1d3bef696d0f7554a3ae41fd736873f79d50e29996ba654529dcc8c15f974b0a483376a55e4499ea8105a7bae7c778fa858f7b0bc63402dada9478643f14ef9f877621e694b8c46c009213b7d6aeba332e7e423aaf322a33eab4fb1ab504635183aa7af7979cdd3c239f10ec9709b69e96d8b921052", 0xf3}], 0x7, &(0x7f0000002380)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}}}}], 0x68}}, {{&(0x7f0000002400)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002780)=[{&(0x7f0000002440)="550e0938c5c0f50e1483a6a392f017c7d05022832f5a26ef75d1408ab3107817f67cb8cc868c51586ce98e17b1d59d33928139ec381939a9a32d73ec858d593ec29fc410f48011e6262b148e8df06bb8ee38befbe1d5073a33037b2421badfb3657cb789fd6ca39f1088390976a11ead797e41021f748647abe35320535de8f493b8f17697dcfe3cf66a9ba38f8737b8c061ef6b259223a1009975da6da852b029ec0423e474dd1c659418e7b05195382c05b285e3d4457604", 0xb9}, {&(0x7f0000002500)="041eb6e0f6ee6080b78751b0876d7fa3050f2eec2ed35957295e59a3a9316eae03457506221122265b71d57f7367cab94c0fbc1e012983ee4fd14e5977d52ae6052f58718c9dc94daea60fdc6fafea0e38157f73b878f154443fec514ccdc711", 0x60}, {&(0x7f0000002580)="622dd9b38709b3858d808865558770be9203ec256e4e1f85a6fe4d44a9bf08adbd4334750ebb318c8ecc78a729486e3bae4f01ac4d49755016fd549bb58fa80418ff8cf13280295ee1ae131967e0c32508aa4f0402cdd1b5f9582763641412d8f26e4ad57c32f7536e11f9450ea3b8a233936167760230355e20c3d6843e82a919cc00dfc6f52f780f74c8648978018969f87e0d83f5a8af5b", 0x99}, {&(0x7f0000002640)="68ae2f9917c18a5219867384d6ec43a8ba5d456097f37b31f2c82861c91aab8e90e3ebf5be8ccd2f50524e0d9d449d2e9ea6cbd76b4805238f63b99f05f514588e2b2c5ebc4a672c05d0e70017be1bd7ee615958537188cfc496dec6b937018738ad073f29e6923a4c17", 0x6a}, {&(0x7f00000026c0)="d695f6", 0x3}, {&(0x7f0000002700)="70735c7d4f5da262c759f21a8c0405b91689682ef431d2d0b4876e09a47dc05e6180e17604f6b712086fc82cca9faa992790bd5839710e3e836499a3f72ea6a76fd5682210218da718d3b2ee9dcd7858da1b84621c8b8f1e2921e3e73f153ab2466b74a7370d956ca1f69c84e6cb9bfdf665d357725bf713175b89", 0x7b}], 0x6, &(0x7f0000002800)=[@ip_retopts={{0x24, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x44, [@multicast1, @rand_addr=0x4, @loopback, @loopback]}]}}}], 0x28}}, {{&(0x7f0000002840)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000002a40)=[{&(0x7f0000002880)="95028c718e0cba2fb94064fc184539f34fe4", 0x12}, {&(0x7f00000028c0)="c7645734b64e1d171ba3b51f7c3855e375ef0d36b9779c46f97b01574c28070341d6059a0dfb08e0c1648bc2fcec10da155d05b5127cdb0c173a4e41d109874be88f4e27b6a48d48dbf46dfd3fe963aa7170fd354443fa5c4a8293847fa3abce78e23bc1bdd3d914c1d718b3ec1d4403212a2b5d98f0aaac19cfed1dabc3b29dc7ee781eb23a03b5290cdf08aeac7db1fa8fd03261b5587640099caf1caa19d41235995c1844253d36ebde08aad06aaa14c4286f2891ff1de76f899fe9b5f23f21fb6e6f43ad2e39d7ac46667fa5", 0xce}, {&(0x7f00000029c0)="2a14b025eae10c79c23a2543bd7ceafadd18be2c57cd4968615e3feab2d4dba592a0e8474354f3e1be4b5d6a7ebf69e17bcc29ff4e08b4bb78cd55b75bf4f90425851b0a3a8ca0", 0x47}], 0x3, &(0x7f0000008b80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0xa, 0xffffffffffffffff, [{0x3, 0x4, "a9f9"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef87}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0xc0}}], 0x6, 0x600085c) 08:39:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) sendmmsg$inet(r0, &(0x7f0000008c80)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000140)="e31b0ade652bbd1c0a742f712abc829eb8a4099261c10ea6bdb32b06fb7bd6f9e21e0ee297e013c7b7f84a1f01eaf4c9a050686d989155d9de777f0fe0c5b55ea039ab7f99c7923d9e22817f0b79cc8e205f6f9df6c4a0d900bbdf644cb5b28e76711da928a48e1d5347d3ac45", 0x6d}, {&(0x7f00000002c0)="bdcc816463ff65ba953c023d34e6dae6c08bf3f4ba7946443f7007f231a6edd0dd5447183e2293c0c95e6c93c20a9d38d7eb335e5db95ea1d7988e8ce1fc4e9cc4a1cd06cb48156764fc8e22bb30f3d9f1a26dab0db52b1f595a5516bab66044121c496e338fbbee62c33916e3ffc6520e01c140d65e0657d9b310105a6055fdf09f30874d52d5bc17125763426ffb698070ca64579ba466ee5dac6defbd879d9a6316b1335679eae9cc3f49b271097ec04329b818898f1dc6913fff825367a4478b93e7de77c5", 0xc7}, {&(0x7f0000000040)="decb72915b6c7cc2ab712945e5bab09a5d9e741f15081b762cb2af6c24adc8a5d54436e5e4075eb7816fd1284f45cbc7d3f42526dc8b05eadc2830", 0x3b}, {&(0x7f00000001c0)="83b3df1ed1257626982e73ba268bfe7989c30409fc0db7ff8cd67b3501704c5e02b987d9c389e02c995c98628cf1f8c9ac11dc7d7d938de91af0839b80ad09458d3d428ea63096d7ac6fbfcc12c3ead5764796f36993b18f3bf72dc13a1507fefa744cf3f27ea106d169d3d80f26dbf902", 0x71}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f00000003c0)="131500a017e9f471a520f26115b7131a6e5b25625e6a03cca52c3400018a952036d7dc2128dcb4336c6faae1824ef866100528573b2df6be1ae2d2393ad7994f0f28a0d55d69f39bd2b153e176982c65c5e92598b0e96e7f7ec609ed08c7e4080b097c4e1a9b35e3", 0x68}, {&(0x7f0000000480)="7e7f0bd706f56100fa9d25dccdbcc1886abb4425f9663cc0f83ccf8781d450b4e3b737ed556a25562a90bf23b67e00d6f258f770d19db46fd6c3c05864f313af1eb2fd8fd93f7dd4b76910769cf29d1ec4ba62a473336b0dba86c5d5d0dc49d03b2080993ee6a63e34fc26d96afaf9c3a549e7cc4d96", 0x76}, {&(0x7f0000000500)="b37ef511a1d7d6cd447fc0ab4f4db4631888d3e39fe9c24189e455447e6900319e509ec056d7ec3cae37d426aeadd7fa453b67ff74f399e27eae6acb41bc757fff32a7918d4ccffbfc223a7c4868f8dd4fe6911f9e6eef91995c9cff3d34c6b962a8f8", 0x63}], 0x8, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x68}}, {{&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x4}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000000680)="183af2bdb07a1b9717efc8dd22ba46eb20ddd60bdffead4325b5afd710f6b26e61a1be2983741df7391b243eb9c14b0b199df035ab9ea764685a6db9b97ed0cb5dfd6f589bdf6543dcabffd85dee3569b847241c04b9b5d8c3deec6e33f4d4a3fa6529eb61c93e8fbb0bd7636a490dc7e17f2cbde304d8a4001121a3d7a39a095e6a2102be40588cbef9a0a892a359f05af8644d3b534a930424e7431b13b658e63907f2d53826d7237c6f94c8cdefd231cbde9786b7c9650ab17b7e10f480e833998c8d0e72bc432cd31a4b8405daedfddd912d4b53e42869e4c45b13dd5e", 0xdf}, {&(0x7f0000000780)="9a34c82f4ad6009b0f93fd888db18214f8cf72dc13c37b214b545177150e8e4fb7b6b8801c85f5a7227e638c7e51de26d8f3ce63c9371640149bf76f58db5cd8dc7d86b5f122a4c9212ba3ebe9442ffebba99629834a9d2afa77b3334f2d803bc896717e35d28ebcc188f2cb6f449a351b8c7c4111f7666e85b0691b322682244ed051a2291ed4bbd42c52b212e594285a8fc83cd6d97dfd593a0df27b04bd14e6eb3ba0b6059ced551fa922fc7f", 0xae}, {&(0x7f0000000840)="1de999bfc5f5aa70", 0x8}, {&(0x7f0000000880)="373104ae7e954bd5204260500aeed16c1f9329f6a215c4256ebd0db4a3e20c019546bd9d487a6180a77fbc22b9aa762e47f05ccc39ffefb3a171a33a571fff37d11818a4c6f5976ae66cc834de929a082bafc4682449893ae8faca2a32b2736d1d2342861d4a753a33b56bd8f0622213e7e568244f681a681645c7d964639854006f0e42364d927a6a20b24064435bfa071bf7d80cf27a5f5469802590f81144e18a7308c09be74e93a1f0c648d70b94213b2abd252f1f863d189894ace989e9aa877e8cf3cb0798d928e72f4ca76baf075203582f2d", 0xd6}, {&(0x7f0000000980)="4fd38492e522042074865251dd03e5330ff5a23b12fb58fd94a2ae49918ae3041f6009a60e9d79ed597c3219a4fd4edd9b70f483cd51723ff07828ca834f00ade4214dbe3ee2a50f1af852e104de03b429c8e4170e2b1ac876c5e95a2b7f3a25a891dec5914e1138a55a7ecef73f48405f6b44e2eac259272c107cf20248e1fdea91af77f9a6516012e8cc5bf982b0120c7739bffa80623f4fef211ea3023e9f3e67e7560056a2fc1a7ef4b15edbd6ac4219e225e8697341fe4d9f6f82a076a2d304769c7821b92ef4ca920cd522c53655048fb98d809ff5649e6bd83378fb110ec33c1a9a", 0xe5}, {&(0x7f0000001ac0)="af8ae174deaf3c0b32c0bb120f76073a89ae5680c12fd1cfef69fbcb4417c48b642bdfd6b6e3c0218a18f4af35d00c48507242fbe8078730d03af019ef464a857ed06b45bb10c0b693db229198da0cbe878f98be95e50f46430af5a5ece98399c114c7f91c25791f819ff67911f0f58ba44253e1aa40b4dc3227221e2500a71e868babd495cb363fc195e6fd6eb34a91fa66639bb891fe0d3509dba71fc0fa8a2bda8f", 0xa3}], 0x6}}, {{&(0x7f0000001c00)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001c40)="f06d20c01b1ccbfc15a8fcec379c8024aabe5c612192cd2f9e9259e6b8f4", 0x1e}], 0x1, &(0x7f0000008e00)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x6e, 0x1, 0xf, [{@remote, 0x8}, {@loopback, 0x12a}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}]}, @timestamp={0x44, 0x20, 0x45, 0x0, 0x0, [0x3, 0x1, 0x2440, 0x80008000, 0x6, 0x7, 0x1]}, @noop, @timestamp={0x44, 0x1c, 0xc6, 0x0, 0x4, [0x7, 0x200, 0x7, 0x8, 0x2, 0x800]}, @cipso={0x86, 0xc, 0x2, [{0x2, 0x6, "9c1a44f4"}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x24, 0x18, 0x3, 0x4, [{@remote, 0x1}, {@loopback, 0x8001}, {@local, 0x6}, {@multicast1, 0x1}]}, @generic={0x82, 0xe, "a4ac0724a6c074274eefa0e7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x100}}, {{&(0x7f0000001dc0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002300)=[{&(0x7f0000001e00)="9be8a0a30e2c7f0799076e9a7e2a8da9f89200ea0354a513613d854d46abfada81ef75e0dcdcea8ec023d31a3604d72948e5c48c6ee546621bba49524f3a27b2e0df6744edd7b5b033e952dcb4945f5bc47d47679cd69416dde8ea71751b7fdcb088e15f51bfb8e75e462216373a3f31c28e3aedb2590a5eb88c0cea19643db3f6dfaa51850086372665f3089bb5310d881fa674c4e83a674589de6df6f8cc4660e06d13aa14490df4164d8c2e3168366d606f163427306656df48a8ec5db21d164527171092b0d44aa14c81990a3a988122bc0d439394449497feaea1293e9bb5d42755017cf1fbd7893e95e1e7b567aca85e61", 0xf4}, {&(0x7f0000001f80)="7c386cc044fec1ee527b64047c0c2c7a904e1f2f6231c15cd5cfa7a62833a6eb15eda84db2a474cf7a937b2bc2ffca4ec238da5d07ed3c250bca767a192330bd94ce74ff06415823fc29ef044b171abadc2e52fa0ae8353896652a7061aa50726e4232f787e6903b7f1cbf0872422ce9d1ee460d49ad11b9c942766c6a68dba1d8064fb442d652570b2dd73736d9e9f58a82624a694c3af60ae3947103383df42749a3ae43850db6562dc3aa0017d87c4154cc6d4a75d90203c6ad49617098f0df1dfed54e0c657495300c22a701efdc7ed40390c58f9ffcefcb4c4b33eceadc401b10231f8dbe29e6fdf89a05d92838a77f", 0xf2}, {&(0x7f0000002080)="df6f6964d9d4b4aa92384e41120fb3e0458ad476e15e3e1aba0f32d6b3d295e1dc818913d6e3eab4b802c7ded19cf87e8abacd7757533ce33cb50bb243abe07b25fb12e0168451c8dd44bf17de44a34f0d1f17c221dce08c10b761a2254339d1dba48d3e7a272cc680ec571955fea79ad5242ad37e05ce7e8e29580c75b1cc75", 0x80}, {&(0x7f0000001f00)="33121daa0cc7e73f4b0f739453f4a7ec3bb8b8564947526a61fbda69ea47ae7b9ff1f264a61c204c1145cbb49aa373ecd6e94ad85edaedee2811", 0x3a}, {&(0x7f0000002100)="d7e5697bd4752b47d7abee5a2a3f3de365f5b6b28ba70d9a2029804f263f150d884c9736246af9d4000c4d950ae1eeaa29cc53f2ce759dd034722203a60f18bfd5beccb105a36c5eed138f7d315e9b8079abb5c94547e75ebfdc4542575f9ce112aec0", 0x63}, {&(0x7f0000002180)="757241eb7689b5fb7a813f8e9e9f58fefbfa4669d7127f1e1d9188c5524e9a13617f77d1f99f4a415a82a56496c7b43eda5244ce4097a01cd98537c386c36a803ebce00334990ee6873793c9f608a27e", 0x50}, {&(0x7f0000002200)="fa7da6398560d85c31faf97b252e01257a3e45b4c36471e982eecdaf3edfa9d715a978266c7b818f1ab2b6b133d1797904e739d6fbe0ab436baaa58ff63d7bc0d6fd7a633fd59dcfdb0952015aac82af4d5c315b082366f31364853adde76d73c07ddda03788eaf41fbef929f8127576c201869edb82eb5fdf57c50e5ba1d3bef696d0f7554a3ae41fd736873f79d50e29996ba654529dcc8c15f974b0a483376a55e4499ea8105a7bae7c778fa858f7b0bc63402dada9478643f14ef9f877621e694b8c46c009213b7d6aeba332e7e423aaf322a33eab4fb1ab504635183aa7af7979cdd3c239f10ec9709b69e96d8b921052", 0xf3}], 0x7, &(0x7f0000002380)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}}}}], 0x68}}, {{&(0x7f0000002400)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002780)=[{&(0x7f0000002440)="550e0938c5c0f50e1483a6a392f017c7d05022832f5a26ef75d1408ab3107817f67cb8cc868c51586ce98e17b1d59d33928139ec381939a9a32d73ec858d593ec29fc410f48011e6262b148e8df06bb8ee38befbe1d5073a33037b2421badfb3657cb789fd6ca39f1088390976a11ead797e41021f748647abe35320535de8f493b8f17697dcfe3cf66a9ba38f8737b8c061ef6b259223a1009975da6da852b029ec0423e474dd1c659418e7b05195382c05b285e3d4457604", 0xb9}, {&(0x7f0000002500)="041eb6e0f6ee6080b78751b0876d7fa3050f2eec2ed35957295e59a3a9316eae03457506221122265b71d57f7367cab94c0fbc1e012983ee4fd14e5977d52ae6052f58718c9dc94daea60fdc6fafea0e38157f73b878f154443fec514ccdc711", 0x60}, {&(0x7f0000002580)="622dd9b38709b3858d808865558770be9203ec256e4e1f85a6fe4d44a9bf08adbd4334750ebb318c8ecc78a729486e3bae4f01ac4d49755016fd549bb58fa80418ff8cf13280295ee1ae131967e0c32508aa4f0402cdd1b5f9582763641412d8f26e4ad57c32f7536e11f9450ea3b8a233936167760230355e20c3d6843e82a919cc00dfc6f52f780f74c8648978018969f87e0d83f5a8af5b", 0x99}, {&(0x7f0000002640)="68ae2f9917c18a5219867384d6ec43a8ba5d456097f37b31f2c82861c91aab8e90e3ebf5be8ccd2f50524e0d9d449d2e9ea6cbd76b4805238f63b99f05f514588e2b2c5ebc4a672c05d0e70017be1bd7ee615958537188cfc496dec6b937018738ad073f29e6923a4c17", 0x6a}, {&(0x7f00000026c0)="d695f6", 0x3}, {&(0x7f0000002700)="70735c7d4f5da262c759f21a8c0405b91689682ef431d2d0b4876e09a47dc05e6180e17604f6b712086fc82cca9faa992790bd5839710e3e836499a3f72ea6a76fd5682210218da718d3b2ee9dcd7858da1b84621c8b8f1e2921e3e73f153ab2466b74a7370d956ca1f69c84e6cb9bfdf665d357725bf713175b89", 0x7b}], 0x6, &(0x7f0000002800)=[@ip_retopts={{0x24, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x44, [@multicast1, @rand_addr=0x4, @loopback, @loopback]}]}}}], 0x28}}, {{&(0x7f0000002840)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000002a40)=[{&(0x7f0000002880)="95028c718e0cba2fb94064fc184539f34fe4", 0x12}, {&(0x7f00000028c0)="c7645734b64e1d171ba3b51f7c3855e375ef0d36b9779c46f97b01574c28070341d6059a0dfb08e0c1648bc2fcec10da155d05b5127cdb0c173a4e41d109874be88f4e27b6a48d48dbf46dfd3fe963aa7170fd354443fa5c4a8293847fa3abce78e23bc1bdd3d914c1d718b3ec1d4403212a2b5d98f0aaac19cfed1dabc3b29dc7ee781eb23a03b5290cdf08aeac7db1fa8fd03261b5587640099caf1caa19d41235995c1844253d36ebde08aad06aaa14c4286f2891ff1de76f899fe9b5f23f21fb6e6f43ad2e39d7ac46667fa5", 0xce}, {&(0x7f00000029c0)="2a14b025eae10c79c23a2543bd7ceafadd18be2c57cd4968615e3feab2d4dba592a0e8474354f3e1be4b5d6a7ebf69e17bcc29ff4e08b4bb78cd55b75bf4f90425851b0a3a8ca0", 0x47}], 0x3, &(0x7f0000008b80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0xa, 0xffffffffffffffff, [{0x3, 0x4, "a9f9"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef87}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0xc0}}], 0x6, 0x600085c) 08:39:12 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:12 executing program 2: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r1, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) mknodat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x40, 0xa51df1e2e637bf91) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000003e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 987.208807][ T6485] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:39:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) sendmmsg$inet(r0, &(0x7f0000008c80)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000140)="e31b0ade652bbd1c0a742f712abc829eb8a4099261c10ea6bdb32b06fb7bd6f9e21e0ee297e013c7b7f84a1f01eaf4c9a050686d989155d9de777f0fe0c5b55ea039ab7f99c7923d9e22817f0b79cc8e205f6f9df6c4a0d900bbdf644cb5b28e76711da928a48e1d5347d3ac45", 0x6d}, {&(0x7f00000002c0)="bdcc816463ff65ba953c023d34e6dae6c08bf3f4ba7946443f7007f231a6edd0dd5447183e2293c0c95e6c93c20a9d38d7eb335e5db95ea1d7988e8ce1fc4e9cc4a1cd06cb48156764fc8e22bb30f3d9f1a26dab0db52b1f595a5516bab66044121c496e338fbbee62c33916e3ffc6520e01c140d65e0657d9b310105a6055fdf09f30874d52d5bc17125763426ffb698070ca64579ba466ee5dac6defbd879d9a6316b1335679eae9cc3f49b271097ec04329b818898f1dc6913fff825367a4478b93e7de77c5", 0xc7}, {&(0x7f0000000040)="decb72915b6c7cc2ab712945e5bab09a5d9e741f15081b762cb2af6c24adc8a5d54436e5e4075eb7816fd1284f45cbc7d3f42526dc8b05eadc2830", 0x3b}, {&(0x7f00000001c0)="83b3df1ed1257626982e73ba268bfe7989c30409fc0db7ff8cd67b3501704c5e02b987d9c389e02c995c98628cf1f8c9ac11dc7d7d938de91af0839b80ad09458d3d428ea63096d7ac6fbfcc12c3ead5764796f36993b18f3bf72dc13a1507fefa744cf3f27ea106d169d3d80f26dbf902", 0x71}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f00000003c0)="131500a017e9f471a520f26115b7131a6e5b25625e6a03cca52c3400018a952036d7dc2128dcb4336c6faae1824ef866100528573b2df6be1ae2d2393ad7994f0f28a0d55d69f39bd2b153e176982c65c5e92598b0e96e7f7ec609ed08c7e4080b097c4e1a9b35e3", 0x68}, {&(0x7f0000000480)="7e7f0bd706f56100fa9d25dccdbcc1886abb4425f9663cc0f83ccf8781d450b4e3b737ed556a25562a90bf23b67e00d6f258f770d19db46fd6c3c05864f313af1eb2fd8fd93f7dd4b76910769cf29d1ec4ba62a473336b0dba86c5d5d0dc49d03b2080993ee6a63e34fc26d96afaf9c3a549e7cc4d96", 0x76}, {&(0x7f0000000500)="b37ef511a1d7d6cd447fc0ab4f4db4631888d3e39fe9c24189e455447e6900319e509ec056d7ec3cae37d426aeadd7fa453b67ff74f399e27eae6acb41bc757fff32a7918d4ccffbfc223a7c4868f8dd4fe6911f9e6eef91995c9cff3d34c6b962a8f8", 0x63}], 0x8, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x68}}, {{&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x4}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000000680)="183af2bdb07a1b9717efc8dd22ba46eb20ddd60bdffead4325b5afd710f6b26e61a1be2983741df7391b243eb9c14b0b199df035ab9ea764685a6db9b97ed0cb5dfd6f589bdf6543dcabffd85dee3569b847241c04b9b5d8c3deec6e33f4d4a3fa6529eb61c93e8fbb0bd7636a490dc7e17f2cbde304d8a4001121a3d7a39a095e6a2102be40588cbef9a0a892a359f05af8644d3b534a930424e7431b13b658e63907f2d53826d7237c6f94c8cdefd231cbde9786b7c9650ab17b7e10f480e833998c8d0e72bc432cd31a4b8405daedfddd912d4b53e42869e4c45b13dd5e", 0xdf}, {&(0x7f0000000780)="9a34c82f4ad6009b0f93fd888db18214f8cf72dc13c37b214b545177150e8e4fb7b6b8801c85f5a7227e638c7e51de26d8f3ce63c9371640149bf76f58db5cd8dc7d86b5f122a4c9212ba3ebe9442ffebba99629834a9d2afa77b3334f2d803bc896717e35d28ebcc188f2cb6f449a351b8c7c4111f7666e85b0691b322682244ed051a2291ed4bbd42c52b212e594285a8fc83cd6d97dfd593a0df27b04bd14e6eb3ba0b6059ced551fa922fc7f", 0xae}, {&(0x7f0000000840)="1de999bfc5f5aa70", 0x8}, {&(0x7f0000000880)="373104ae7e954bd5204260500aeed16c1f9329f6a215c4256ebd0db4a3e20c019546bd9d487a6180a77fbc22b9aa762e47f05ccc39ffefb3a171a33a571fff37d11818a4c6f5976ae66cc834de929a082bafc4682449893ae8faca2a32b2736d1d2342861d4a753a33b56bd8f0622213e7e568244f681a681645c7d964639854006f0e42364d927a6a20b24064435bfa071bf7d80cf27a5f5469802590f81144e18a7308c09be74e93a1f0c648d70b94213b2abd252f1f863d189894ace989e9aa877e8cf3cb0798d928e72f4ca76baf075203582f2d", 0xd6}, {&(0x7f0000000980)="4fd38492e522042074865251dd03e5330ff5a23b12fb58fd94a2ae49918ae3041f6009a60e9d79ed597c3219a4fd4edd9b70f483cd51723ff07828ca834f00ade4214dbe3ee2a50f1af852e104de03b429c8e4170e2b1ac876c5e95a2b7f3a25a891dec5914e1138a55a7ecef73f48405f6b44e2eac259272c107cf20248e1fdea91af77f9a6516012e8cc5bf982b0120c7739bffa80623f4fef211ea3023e9f3e67e7560056a2fc1a7ef4b15edbd6ac4219e225e8697341fe4d9f6f82a076a2d304769c7821b92ef4ca920cd522c53655048fb98d809ff5649e6bd83378fb110ec33c1a9a", 0xe5}, {&(0x7f0000001ac0)="af8ae174deaf3c0b32c0bb120f76073a89ae5680c12fd1cfef69fbcb4417c48b642bdfd6b6e3c0218a18f4af35d00c48507242fbe8078730d03af019ef464a857ed06b45bb10c0b693db229198da0cbe878f98be95e50f46430af5a5ece98399c114c7f91c25791f819ff67911f0f58ba44253e1aa40b4dc3227221e2500a71e868babd495cb363fc195e6fd6eb34a91fa66639bb891fe0d3509dba71fc0fa8a2bda8f", 0xa3}], 0x6}}, {{&(0x7f0000001c00)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001c40)="f06d20c01b1ccbfc15a8fcec379c8024aabe5c612192cd2f9e9259e6b8f4", 0x1e}], 0x1, &(0x7f0000008e00)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x6e, 0x1, 0xf, [{@remote, 0x8}, {@loopback, 0x12a}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}]}, @timestamp={0x44, 0x20, 0x45, 0x0, 0x0, [0x3, 0x1, 0x2440, 0x80008000, 0x6, 0x7, 0x1]}, @noop, @timestamp={0x44, 0x1c, 0xc6, 0x0, 0x4, [0x7, 0x200, 0x7, 0x8, 0x2, 0x800]}, @cipso={0x86, 0xc, 0x2, [{0x2, 0x6, "9c1a44f4"}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x24, 0x18, 0x3, 0x4, [{@remote, 0x1}, {@loopback, 0x8001}, {@local, 0x6}, {@multicast1, 0x1}]}, @generic={0x82, 0xe, "a4ac0724a6c074274eefa0e7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x100}}, {{&(0x7f0000001dc0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002300)=[{&(0x7f0000001e00)="9be8a0a30e2c7f0799076e9a7e2a8da9f89200ea0354a513613d854d46abfada81ef75e0dcdcea8ec023d31a3604d72948e5c48c6ee546621bba49524f3a27b2e0df6744edd7b5b033e952dcb4945f5bc47d47679cd69416dde8ea71751b7fdcb088e15f51bfb8e75e462216373a3f31c28e3aedb2590a5eb88c0cea19643db3f6dfaa51850086372665f3089bb5310d881fa674c4e83a674589de6df6f8cc4660e06d13aa14490df4164d8c2e3168366d606f163427306656df48a8ec5db21d164527171092b0d44aa14c81990a3a988122bc0d439394449497feaea1293e9bb5d42755017cf1fbd7893e95e1e7b567aca85e61", 0xf4}, {&(0x7f0000001f80)="7c386cc044fec1ee527b64047c0c2c7a904e1f2f6231c15cd5cfa7a62833a6eb15eda84db2a474cf7a937b2bc2ffca4ec238da5d07ed3c250bca767a192330bd94ce74ff06415823fc29ef044b171abadc2e52fa0ae8353896652a7061aa50726e4232f787e6903b7f1cbf0872422ce9d1ee460d49ad11b9c942766c6a68dba1d8064fb442d652570b2dd73736d9e9f58a82624a694c3af60ae3947103383df42749a3ae43850db6562dc3aa0017d87c4154cc6d4a75d90203c6ad49617098f0df1dfed54e0c657495300c22a701efdc7ed40390c58f9ffcefcb4c4b33eceadc401b10231f8dbe29e6fdf89a05d92838a77f", 0xf2}, {&(0x7f0000002080)="df6f6964d9d4b4aa92384e41120fb3e0458ad476e15e3e1aba0f32d6b3d295e1dc818913d6e3eab4b802c7ded19cf87e8abacd7757533ce33cb50bb243abe07b25fb12e0168451c8dd44bf17de44a34f0d1f17c221dce08c10b761a2254339d1dba48d3e7a272cc680ec571955fea79ad5242ad37e05ce7e8e29580c75b1cc75", 0x80}, {&(0x7f0000001f00)="33121daa0cc7e73f4b0f739453f4a7ec3bb8b8564947526a61fbda69ea47ae7b9ff1f264a61c204c1145cbb49aa373ecd6e94ad85edaedee2811", 0x3a}, {&(0x7f0000002100)="d7e5697bd4752b47d7abee5a2a3f3de365f5b6b28ba70d9a2029804f263f150d884c9736246af9d4000c4d950ae1eeaa29cc53f2ce759dd034722203a60f18bfd5beccb105a36c5eed138f7d315e9b8079abb5c94547e75ebfdc4542575f9ce112aec0", 0x63}, {&(0x7f0000002180)="757241eb7689b5fb7a813f8e9e9f58fefbfa4669d7127f1e1d9188c5524e9a13617f77d1f99f4a415a82a56496c7b43eda5244ce4097a01cd98537c386c36a803ebce00334990ee6873793c9f608a27e", 0x50}, {&(0x7f0000002200)="fa7da6398560d85c31faf97b252e01257a3e45b4c36471e982eecdaf3edfa9d715a978266c7b818f1ab2b6b133d1797904e739d6fbe0ab436baaa58ff63d7bc0d6fd7a633fd59dcfdb0952015aac82af4d5c315b082366f31364853adde76d73c07ddda03788eaf41fbef929f8127576c201869edb82eb5fdf57c50e5ba1d3bef696d0f7554a3ae41fd736873f79d50e29996ba654529dcc8c15f974b0a483376a55e4499ea8105a7bae7c778fa858f7b0bc63402dada9478643f14ef9f877621e694b8c46c009213b7d6aeba332e7e423aaf322a33eab4fb1ab504635183aa7af7979cdd3c239f10ec9709b69e96d8b921052", 0xf3}], 0x7, &(0x7f0000002380)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}}}}], 0x68}}, {{&(0x7f0000002400)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002780)=[{&(0x7f0000002440)="550e0938c5c0f50e1483a6a392f017c7d05022832f5a26ef75d1408ab3107817f67cb8cc868c51586ce98e17b1d59d33928139ec381939a9a32d73ec858d593ec29fc410f48011e6262b148e8df06bb8ee38befbe1d5073a33037b2421badfb3657cb789fd6ca39f1088390976a11ead797e41021f748647abe35320535de8f493b8f17697dcfe3cf66a9ba38f8737b8c061ef6b259223a1009975da6da852b029ec0423e474dd1c659418e7b05195382c05b285e3d4457604", 0xb9}, {&(0x7f0000002500)="041eb6e0f6ee6080b78751b0876d7fa3050f2eec2ed35957295e59a3a9316eae03457506221122265b71d57f7367cab94c0fbc1e012983ee4fd14e5977d52ae6052f58718c9dc94daea60fdc6fafea0e38157f73b878f154443fec514ccdc711", 0x60}, {&(0x7f0000002580)="622dd9b38709b3858d808865558770be9203ec256e4e1f85a6fe4d44a9bf08adbd4334750ebb318c8ecc78a729486e3bae4f01ac4d49755016fd549bb58fa80418ff8cf13280295ee1ae131967e0c32508aa4f0402cdd1b5f9582763641412d8f26e4ad57c32f7536e11f9450ea3b8a233936167760230355e20c3d6843e82a919cc00dfc6f52f780f74c8648978018969f87e0d83f5a8af5b", 0x99}, {&(0x7f0000002640)="68ae2f9917c18a5219867384d6ec43a8ba5d456097f37b31f2c82861c91aab8e90e3ebf5be8ccd2f50524e0d9d449d2e9ea6cbd76b4805238f63b99f05f514588e2b2c5ebc4a672c05d0e70017be1bd7ee615958537188cfc496dec6b937018738ad073f29e6923a4c17", 0x6a}, {&(0x7f00000026c0)="d695f6", 0x3}, {&(0x7f0000002700)="70735c7d4f5da262c759f21a8c0405b91689682ef431d2d0b4876e09a47dc05e6180e17604f6b712086fc82cca9faa992790bd5839710e3e836499a3f72ea6a76fd5682210218da718d3b2ee9dcd7858da1b84621c8b8f1e2921e3e73f153ab2466b74a7370d956ca1f69c84e6cb9bfdf665d357725bf713175b89", 0x7b}], 0x6, &(0x7f0000002800)=[@ip_retopts={{0x24, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x44, [@multicast1, @rand_addr=0x4, @loopback, @loopback]}]}}}], 0x28}}, {{&(0x7f0000002840)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000002a40)=[{&(0x7f0000002880)="95028c718e0cba2fb94064fc184539f34fe4", 0x12}, {&(0x7f00000028c0)="c7645734b64e1d171ba3b51f7c3855e375ef0d36b9779c46f97b01574c28070341d6059a0dfb08e0c1648bc2fcec10da155d05b5127cdb0c173a4e41d109874be88f4e27b6a48d48dbf46dfd3fe963aa7170fd354443fa5c4a8293847fa3abce78e23bc1bdd3d914c1d718b3ec1d4403212a2b5d98f0aaac19cfed1dabc3b29dc7ee781eb23a03b5290cdf08aeac7db1fa8fd03261b5587640099caf1caa19d41235995c1844253d36ebde08aad06aaa14c4286f2891ff1de76f899fe9b5f23f21fb6e6f43ad2e39d7ac46667fa5", 0xce}, {&(0x7f00000029c0)="2a14b025eae10c79c23a2543bd7ceafadd18be2c57cd4968615e3feab2d4dba592a0e8474354f3e1be4b5d6a7ebf69e17bcc29ff4e08b4bb78cd55b75bf4f90425851b0a3a8ca0", 0x47}], 0x3, &(0x7f0000008b80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0xa, 0xffffffffffffffff, [{0x3, 0x4, "a9f9"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef87}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0xc0}}], 0x6, 0x600085c) 08:39:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) sendmmsg$inet(r0, &(0x7f0000008c80)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000140)="e31b0ade652bbd1c0a742f712abc829eb8a4099261c10ea6bdb32b06fb7bd6f9e21e0ee297e013c7b7f84a1f01eaf4c9a050686d989155d9de777f0fe0c5b55ea039ab7f99c7923d9e22817f0b79cc8e205f6f9df6c4a0d900bbdf644cb5b28e76711da928a48e1d5347d3ac45", 0x6d}, {&(0x7f00000002c0)="bdcc816463ff65ba953c023d34e6dae6c08bf3f4ba7946443f7007f231a6edd0dd5447183e2293c0c95e6c93c20a9d38d7eb335e5db95ea1d7988e8ce1fc4e9cc4a1cd06cb48156764fc8e22bb30f3d9f1a26dab0db52b1f595a5516bab66044121c496e338fbbee62c33916e3ffc6520e01c140d65e0657d9b310105a6055fdf09f30874d52d5bc17125763426ffb698070ca64579ba466ee5dac6defbd879d9a6316b1335679eae9cc3f49b271097ec04329b818898f1dc6913fff825367a4478b93e7de77c5", 0xc7}, {&(0x7f0000000040)="decb72915b6c7cc2ab712945e5bab09a5d9e741f15081b762cb2af6c24adc8a5d54436e5e4075eb7816fd1284f45cbc7d3f42526dc8b05eadc2830", 0x3b}, {&(0x7f00000001c0)="83b3df1ed1257626982e73ba268bfe7989c30409fc0db7ff8cd67b3501704c5e02b987d9c389e02c995c98628cf1f8c9ac11dc7d7d938de91af0839b80ad09458d3d428ea63096d7ac6fbfcc12c3ead5764796f36993b18f3bf72dc13a1507fefa744cf3f27ea106d169d3d80f26dbf902", 0x71}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f00000003c0)="131500a017e9f471a520f26115b7131a6e5b25625e6a03cca52c3400018a952036d7dc2128dcb4336c6faae1824ef866100528573b2df6be1ae2d2393ad7994f0f28a0d55d69f39bd2b153e176982c65c5e92598b0e96e7f7ec609ed08c7e4080b097c4e1a9b35e3", 0x68}, {&(0x7f0000000480)="7e7f0bd706f56100fa9d25dccdbcc1886abb4425f9663cc0f83ccf8781d450b4e3b737ed556a25562a90bf23b67e00d6f258f770d19db46fd6c3c05864f313af1eb2fd8fd93f7dd4b76910769cf29d1ec4ba62a473336b0dba86c5d5d0dc49d03b2080993ee6a63e34fc26d96afaf9c3a549e7cc4d96", 0x76}, {&(0x7f0000000500)="b37ef511a1d7d6cd447fc0ab4f4db4631888d3e39fe9c24189e455447e6900319e509ec056d7ec3cae37d426aeadd7fa453b67ff74f399e27eae6acb41bc757fff32a7918d4ccffbfc223a7c4868f8dd4fe6911f9e6eef91995c9cff3d34c6b962a8f8", 0x63}], 0x8, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x68}}, {{&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x4}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000000680)="183af2bdb07a1b9717efc8dd22ba46eb20ddd60bdffead4325b5afd710f6b26e61a1be2983741df7391b243eb9c14b0b199df035ab9ea764685a6db9b97ed0cb5dfd6f589bdf6543dcabffd85dee3569b847241c04b9b5d8c3deec6e33f4d4a3fa6529eb61c93e8fbb0bd7636a490dc7e17f2cbde304d8a4001121a3d7a39a095e6a2102be40588cbef9a0a892a359f05af8644d3b534a930424e7431b13b658e63907f2d53826d7237c6f94c8cdefd231cbde9786b7c9650ab17b7e10f480e833998c8d0e72bc432cd31a4b8405daedfddd912d4b53e42869e4c45b13dd5e", 0xdf}, {&(0x7f0000000780)="9a34c82f4ad6009b0f93fd888db18214f8cf72dc13c37b214b545177150e8e4fb7b6b8801c85f5a7227e638c7e51de26d8f3ce63c9371640149bf76f58db5cd8dc7d86b5f122a4c9212ba3ebe9442ffebba99629834a9d2afa77b3334f2d803bc896717e35d28ebcc188f2cb6f449a351b8c7c4111f7666e85b0691b322682244ed051a2291ed4bbd42c52b212e594285a8fc83cd6d97dfd593a0df27b04bd14e6eb3ba0b6059ced551fa922fc7f", 0xae}, {&(0x7f0000000840)="1de999bfc5f5aa70", 0x8}, {&(0x7f0000000880)="373104ae7e954bd5204260500aeed16c1f9329f6a215c4256ebd0db4a3e20c019546bd9d487a6180a77fbc22b9aa762e47f05ccc39ffefb3a171a33a571fff37d11818a4c6f5976ae66cc834de929a082bafc4682449893ae8faca2a32b2736d1d2342861d4a753a33b56bd8f0622213e7e568244f681a681645c7d964639854006f0e42364d927a6a20b24064435bfa071bf7d80cf27a5f5469802590f81144e18a7308c09be74e93a1f0c648d70b94213b2abd252f1f863d189894ace989e9aa877e8cf3cb0798d928e72f4ca76baf075203582f2d", 0xd6}, {&(0x7f0000000980)="4fd38492e522042074865251dd03e5330ff5a23b12fb58fd94a2ae49918ae3041f6009a60e9d79ed597c3219a4fd4edd9b70f483cd51723ff07828ca834f00ade4214dbe3ee2a50f1af852e104de03b429c8e4170e2b1ac876c5e95a2b7f3a25a891dec5914e1138a55a7ecef73f48405f6b44e2eac259272c107cf20248e1fdea91af77f9a6516012e8cc5bf982b0120c7739bffa80623f4fef211ea3023e9f3e67e7560056a2fc1a7ef4b15edbd6ac4219e225e8697341fe4d9f6f82a076a2d304769c7821b92ef4ca920cd522c53655048fb98d809ff5649e6bd83378fb110ec33c1a9a", 0xe5}, {&(0x7f0000001ac0)="af8ae174deaf3c0b32c0bb120f76073a89ae5680c12fd1cfef69fbcb4417c48b642bdfd6b6e3c0218a18f4af35d00c48507242fbe8078730d03af019ef464a857ed06b45bb10c0b693db229198da0cbe878f98be95e50f46430af5a5ece98399c114c7f91c25791f819ff67911f0f58ba44253e1aa40b4dc3227221e2500a71e868babd495cb363fc195e6fd6eb34a91fa66639bb891fe0d3509dba71fc0fa8a2bda8f", 0xa3}], 0x6}}, {{&(0x7f0000001c00)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001c40)="f06d20c01b1ccbfc15a8fcec379c8024aabe5c612192cd2f9e9259e6b8f4", 0x1e}], 0x1, &(0x7f0000008e00)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x6e, 0x1, 0xf, [{@remote, 0x8}, {@loopback, 0x12a}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}]}, @timestamp={0x44, 0x20, 0x45, 0x0, 0x0, [0x3, 0x1, 0x2440, 0x80008000, 0x6, 0x7, 0x1]}, @noop, @timestamp={0x44, 0x1c, 0xc6, 0x0, 0x4, [0x7, 0x200, 0x7, 0x8, 0x2, 0x800]}, @cipso={0x86, 0xc, 0x2, [{0x2, 0x6, "9c1a44f4"}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x24, 0x18, 0x3, 0x4, [{@remote, 0x1}, {@loopback, 0x8001}, {@local, 0x6}, {@multicast1, 0x1}]}, @generic={0x82, 0xe, "a4ac0724a6c074274eefa0e7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x100}}, {{&(0x7f0000001dc0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002300)=[{&(0x7f0000001e00)="9be8a0a30e2c7f0799076e9a7e2a8da9f89200ea0354a513613d854d46abfada81ef75e0dcdcea8ec023d31a3604d72948e5c48c6ee546621bba49524f3a27b2e0df6744edd7b5b033e952dcb4945f5bc47d47679cd69416dde8ea71751b7fdcb088e15f51bfb8e75e462216373a3f31c28e3aedb2590a5eb88c0cea19643db3f6dfaa51850086372665f3089bb5310d881fa674c4e83a674589de6df6f8cc4660e06d13aa14490df4164d8c2e3168366d606f163427306656df48a8ec5db21d164527171092b0d44aa14c81990a3a988122bc0d439394449497feaea1293e9bb5d42755017cf1fbd7893e95e1e7b567aca85e61", 0xf4}, {&(0x7f0000001f80)="7c386cc044fec1ee527b64047c0c2c7a904e1f2f6231c15cd5cfa7a62833a6eb15eda84db2a474cf7a937b2bc2ffca4ec238da5d07ed3c250bca767a192330bd94ce74ff06415823fc29ef044b171abadc2e52fa0ae8353896652a7061aa50726e4232f787e6903b7f1cbf0872422ce9d1ee460d49ad11b9c942766c6a68dba1d8064fb442d652570b2dd73736d9e9f58a82624a694c3af60ae3947103383df42749a3ae43850db6562dc3aa0017d87c4154cc6d4a75d90203c6ad49617098f0df1dfed54e0c657495300c22a701efdc7ed40390c58f9ffcefcb4c4b33eceadc401b10231f8dbe29e6fdf89a05d92838a77f", 0xf2}, {&(0x7f0000002080)="df6f6964d9d4b4aa92384e41120fb3e0458ad476e15e3e1aba0f32d6b3d295e1dc818913d6e3eab4b802c7ded19cf87e8abacd7757533ce33cb50bb243abe07b25fb12e0168451c8dd44bf17de44a34f0d1f17c221dce08c10b761a2254339d1dba48d3e7a272cc680ec571955fea79ad5242ad37e05ce7e8e29580c75b1cc75", 0x80}, {&(0x7f0000001f00)="33121daa0cc7e73f4b0f739453f4a7ec3bb8b8564947526a61fbda69ea47ae7b9ff1f264a61c204c1145cbb49aa373ecd6e94ad85edaedee2811", 0x3a}, {&(0x7f0000002100)="d7e5697bd4752b47d7abee5a2a3f3de365f5b6b28ba70d9a2029804f263f150d884c9736246af9d4000c4d950ae1eeaa29cc53f2ce759dd034722203a60f18bfd5beccb105a36c5eed138f7d315e9b8079abb5c94547e75ebfdc4542575f9ce112aec0", 0x63}, {&(0x7f0000002180)="757241eb7689b5fb7a813f8e9e9f58fefbfa4669d7127f1e1d9188c5524e9a13617f77d1f99f4a415a82a56496c7b43eda5244ce4097a01cd98537c386c36a803ebce00334990ee6873793c9f608a27e", 0x50}, {&(0x7f0000002200)="fa7da6398560d85c31faf97b252e01257a3e45b4c36471e982eecdaf3edfa9d715a978266c7b818f1ab2b6b133d1797904e739d6fbe0ab436baaa58ff63d7bc0d6fd7a633fd59dcfdb0952015aac82af4d5c315b082366f31364853adde76d73c07ddda03788eaf41fbef929f8127576c201869edb82eb5fdf57c50e5ba1d3bef696d0f7554a3ae41fd736873f79d50e29996ba654529dcc8c15f974b0a483376a55e4499ea8105a7bae7c778fa858f7b0bc63402dada9478643f14ef9f877621e694b8c46c009213b7d6aeba332e7e423aaf322a33eab4fb1ab504635183aa7af7979cdd3c239f10ec9709b69e96d8b921052", 0xf3}], 0x7, &(0x7f0000002380)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}}}}], 0x68}}, {{&(0x7f0000002400)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002780)=[{&(0x7f0000002440)="550e0938c5c0f50e1483a6a392f017c7d05022832f5a26ef75d1408ab3107817f67cb8cc868c51586ce98e17b1d59d33928139ec381939a9a32d73ec858d593ec29fc410f48011e6262b148e8df06bb8ee38befbe1d5073a33037b2421badfb3657cb789fd6ca39f1088390976a11ead797e41021f748647abe35320535de8f493b8f17697dcfe3cf66a9ba38f8737b8c061ef6b259223a1009975da6da852b029ec0423e474dd1c659418e7b05195382c05b285e3d4457604", 0xb9}, {&(0x7f0000002500)="041eb6e0f6ee6080b78751b0876d7fa3050f2eec2ed35957295e59a3a9316eae03457506221122265b71d57f7367cab94c0fbc1e012983ee4fd14e5977d52ae6052f58718c9dc94daea60fdc6fafea0e38157f73b878f154443fec514ccdc711", 0x60}, {&(0x7f0000002580)="622dd9b38709b3858d808865558770be9203ec256e4e1f85a6fe4d44a9bf08adbd4334750ebb318c8ecc78a729486e3bae4f01ac4d49755016fd549bb58fa80418ff8cf13280295ee1ae131967e0c32508aa4f0402cdd1b5f9582763641412d8f26e4ad57c32f7536e11f9450ea3b8a233936167760230355e20c3d6843e82a919cc00dfc6f52f780f74c8648978018969f87e0d83f5a8af5b", 0x99}, {&(0x7f0000002640)="68ae2f9917c18a5219867384d6ec43a8ba5d456097f37b31f2c82861c91aab8e90e3ebf5be8ccd2f50524e0d9d449d2e9ea6cbd76b4805238f63b99f05f514588e2b2c5ebc4a672c05d0e70017be1bd7ee615958537188cfc496dec6b937018738ad073f29e6923a4c17", 0x6a}, {&(0x7f00000026c0)="d695f6", 0x3}, {&(0x7f0000002700)="70735c7d4f5da262c759f21a8c0405b91689682ef431d2d0b4876e09a47dc05e6180e17604f6b712086fc82cca9faa992790bd5839710e3e836499a3f72ea6a76fd5682210218da718d3b2ee9dcd7858da1b84621c8b8f1e2921e3e73f153ab2466b74a7370d956ca1f69c84e6cb9bfdf665d357725bf713175b89", 0x7b}], 0x6, &(0x7f0000002800)=[@ip_retopts={{0x24, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x44, [@multicast1, @rand_addr=0x4, @loopback, @loopback]}]}}}], 0x28}}, {{&(0x7f0000002840)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000002a40)=[{&(0x7f0000002880)="95028c718e0cba2fb94064fc184539f34fe4", 0x12}, {&(0x7f00000028c0)="c7645734b64e1d171ba3b51f7c3855e375ef0d36b9779c46f97b01574c28070341d6059a0dfb08e0c1648bc2fcec10da155d05b5127cdb0c173a4e41d109874be88f4e27b6a48d48dbf46dfd3fe963aa7170fd354443fa5c4a8293847fa3abce78e23bc1bdd3d914c1d718b3ec1d4403212a2b5d98f0aaac19cfed1dabc3b29dc7ee781eb23a03b5290cdf08aeac7db1fa8fd03261b5587640099caf1caa19d41235995c1844253d36ebde08aad06aaa14c4286f2891ff1de76f899fe9b5f23f21fb6e6f43ad2e39d7ac46667fa5", 0xce}, {&(0x7f00000029c0)="2a14b025eae10c79c23a2543bd7ceafadd18be2c57cd4968615e3feab2d4dba592a0e8474354f3e1be4b5d6a7ebf69e17bcc29ff4e08b4bb78cd55b75bf4f90425851b0a3a8ca0", 0x47}], 0x3, &(0x7f0000008b80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0xa, 0xffffffffffffffff, [{0x3, 0x4, "a9f9"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef87}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0xc0}}], 0x6, 0x600085c) 08:39:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) sendmmsg$inet(r0, &(0x7f0000008c80)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000140)="e31b0ade652bbd1c0a742f712abc829eb8a4099261c10ea6bdb32b06fb7bd6f9e21e0ee297e013c7b7f84a1f01eaf4c9a050686d989155d9de777f0fe0c5b55ea039ab7f99c7923d9e22817f0b79cc8e205f6f9df6c4a0d900bbdf644cb5b28e76711da928a48e1d5347d3ac45", 0x6d}, {&(0x7f00000002c0)="bdcc816463ff65ba953c023d34e6dae6c08bf3f4ba7946443f7007f231a6edd0dd5447183e2293c0c95e6c93c20a9d38d7eb335e5db95ea1d7988e8ce1fc4e9cc4a1cd06cb48156764fc8e22bb30f3d9f1a26dab0db52b1f595a5516bab66044121c496e338fbbee62c33916e3ffc6520e01c140d65e0657d9b310105a6055fdf09f30874d52d5bc17125763426ffb698070ca64579ba466ee5dac6defbd879d9a6316b1335679eae9cc3f49b271097ec04329b818898f1dc6913fff825367a4478b93e7de77c5", 0xc7}, {&(0x7f0000000040)="decb72915b6c7cc2ab712945e5bab09a5d9e741f15081b762cb2af6c24adc8a5d54436e5e4075eb7816fd1284f45cbc7d3f42526dc8b05eadc2830", 0x3b}, {&(0x7f00000001c0)="83b3df1ed1257626982e73ba268bfe7989c30409fc0db7ff8cd67b3501704c5e02b987d9c389e02c995c98628cf1f8c9ac11dc7d7d938de91af0839b80ad09458d3d428ea63096d7ac6fbfcc12c3ead5764796f36993b18f3bf72dc13a1507fefa744cf3f27ea106d169d3d80f26dbf902", 0x71}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f00000003c0)="131500a017e9f471a520f26115b7131a6e5b25625e6a03cca52c3400018a952036d7dc2128dcb4336c6faae1824ef866100528573b2df6be1ae2d2393ad7994f0f28a0d55d69f39bd2b153e176982c65c5e92598b0e96e7f7ec609ed08c7e4080b097c4e1a9b35e3", 0x68}, {&(0x7f0000000480)="7e7f0bd706f56100fa9d25dccdbcc1886abb4425f9663cc0f83ccf8781d450b4e3b737ed556a25562a90bf23b67e00d6f258f770d19db46fd6c3c05864f313af1eb2fd8fd93f7dd4b76910769cf29d1ec4ba62a473336b0dba86c5d5d0dc49d03b2080993ee6a63e34fc26d96afaf9c3a549e7cc4d96", 0x76}, {&(0x7f0000000500)="b37ef511a1d7d6cd447fc0ab4f4db4631888d3e39fe9c24189e455447e6900319e509ec056d7ec3cae37d426aeadd7fa453b67ff74f399e27eae6acb41bc757fff32a7918d4ccffbfc223a7c4868f8dd4fe6911f9e6eef91995c9cff3d34c6b962a8f8", 0x63}], 0x8, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x68}}, {{&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x4}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000000680)="183af2bdb07a1b9717efc8dd22ba46eb20ddd60bdffead4325b5afd710f6b26e61a1be2983741df7391b243eb9c14b0b199df035ab9ea764685a6db9b97ed0cb5dfd6f589bdf6543dcabffd85dee3569b847241c04b9b5d8c3deec6e33f4d4a3fa6529eb61c93e8fbb0bd7636a490dc7e17f2cbde304d8a4001121a3d7a39a095e6a2102be40588cbef9a0a892a359f05af8644d3b534a930424e7431b13b658e63907f2d53826d7237c6f94c8cdefd231cbde9786b7c9650ab17b7e10f480e833998c8d0e72bc432cd31a4b8405daedfddd912d4b53e42869e4c45b13dd5e", 0xdf}, {&(0x7f0000000780)="9a34c82f4ad6009b0f93fd888db18214f8cf72dc13c37b214b545177150e8e4fb7b6b8801c85f5a7227e638c7e51de26d8f3ce63c9371640149bf76f58db5cd8dc7d86b5f122a4c9212ba3ebe9442ffebba99629834a9d2afa77b3334f2d803bc896717e35d28ebcc188f2cb6f449a351b8c7c4111f7666e85b0691b322682244ed051a2291ed4bbd42c52b212e594285a8fc83cd6d97dfd593a0df27b04bd14e6eb3ba0b6059ced551fa922fc7f", 0xae}, {&(0x7f0000000840)="1de999bfc5f5aa70", 0x8}, {&(0x7f0000000880)="373104ae7e954bd5204260500aeed16c1f9329f6a215c4256ebd0db4a3e20c019546bd9d487a6180a77fbc22b9aa762e47f05ccc39ffefb3a171a33a571fff37d11818a4c6f5976ae66cc834de929a082bafc4682449893ae8faca2a32b2736d1d2342861d4a753a33b56bd8f0622213e7e568244f681a681645c7d964639854006f0e42364d927a6a20b24064435bfa071bf7d80cf27a5f5469802590f81144e18a7308c09be74e93a1f0c648d70b94213b2abd252f1f863d189894ace989e9aa877e8cf3cb0798d928e72f4ca76baf075203582f2d", 0xd6}, {&(0x7f0000000980)="4fd38492e522042074865251dd03e5330ff5a23b12fb58fd94a2ae49918ae3041f6009a60e9d79ed597c3219a4fd4edd9b70f483cd51723ff07828ca834f00ade4214dbe3ee2a50f1af852e104de03b429c8e4170e2b1ac876c5e95a2b7f3a25a891dec5914e1138a55a7ecef73f48405f6b44e2eac259272c107cf20248e1fdea91af77f9a6516012e8cc5bf982b0120c7739bffa80623f4fef211ea3023e9f3e67e7560056a2fc1a7ef4b15edbd6ac4219e225e8697341fe4d9f6f82a076a2d304769c7821b92ef4ca920cd522c53655048fb98d809ff5649e6bd83378fb110ec33c1a9a", 0xe5}, {&(0x7f0000001ac0)="af8ae174deaf3c0b32c0bb120f76073a89ae5680c12fd1cfef69fbcb4417c48b642bdfd6b6e3c0218a18f4af35d00c48507242fbe8078730d03af019ef464a857ed06b45bb10c0b693db229198da0cbe878f98be95e50f46430af5a5ece98399c114c7f91c25791f819ff67911f0f58ba44253e1aa40b4dc3227221e2500a71e868babd495cb363fc195e6fd6eb34a91fa66639bb891fe0d3509dba71fc0fa8a2bda8f", 0xa3}], 0x6}}, {{&(0x7f0000001c00)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001c40)="f06d20c01b1ccbfc15a8fcec379c8024aabe5c612192cd2f9e9259e6b8f4", 0x1e}], 0x1, &(0x7f0000008e00)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x6e, 0x1, 0xf, [{@remote, 0x8}, {@loopback, 0x12a}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}]}, @timestamp={0x44, 0x20, 0x45, 0x0, 0x0, [0x3, 0x1, 0x2440, 0x80008000, 0x6, 0x7, 0x1]}, @noop, @timestamp={0x44, 0x1c, 0xc6, 0x0, 0x4, [0x7, 0x200, 0x7, 0x8, 0x2, 0x800]}, @cipso={0x86, 0xc, 0x2, [{0x2, 0x6, "9c1a44f4"}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x24, 0x18, 0x3, 0x4, [{@remote, 0x1}, {@loopback, 0x8001}, {@local, 0x6}, {@multicast1, 0x1}]}, @generic={0x82, 0xe, "a4ac0724a6c074274eefa0e7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x100}}, {{&(0x7f0000001dc0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002300)=[{&(0x7f0000001e00)="9be8a0a30e2c7f0799076e9a7e2a8da9f89200ea0354a513613d854d46abfada81ef75e0dcdcea8ec023d31a3604d72948e5c48c6ee546621bba49524f3a27b2e0df6744edd7b5b033e952dcb4945f5bc47d47679cd69416dde8ea71751b7fdcb088e15f51bfb8e75e462216373a3f31c28e3aedb2590a5eb88c0cea19643db3f6dfaa51850086372665f3089bb5310d881fa674c4e83a674589de6df6f8cc4660e06d13aa14490df4164d8c2e3168366d606f163427306656df48a8ec5db21d164527171092b0d44aa14c81990a3a988122bc0d439394449497feaea1293e9bb5d42755017cf1fbd7893e95e1e7b567aca85e61", 0xf4}, {&(0x7f0000001f80)="7c386cc044fec1ee527b64047c0c2c7a904e1f2f6231c15cd5cfa7a62833a6eb15eda84db2a474cf7a937b2bc2ffca4ec238da5d07ed3c250bca767a192330bd94ce74ff06415823fc29ef044b171abadc2e52fa0ae8353896652a7061aa50726e4232f787e6903b7f1cbf0872422ce9d1ee460d49ad11b9c942766c6a68dba1d8064fb442d652570b2dd73736d9e9f58a82624a694c3af60ae3947103383df42749a3ae43850db6562dc3aa0017d87c4154cc6d4a75d90203c6ad49617098f0df1dfed54e0c657495300c22a701efdc7ed40390c58f9ffcefcb4c4b33eceadc401b10231f8dbe29e6fdf89a05d92838a77f", 0xf2}, {&(0x7f0000002080)="df6f6964d9d4b4aa92384e41120fb3e0458ad476e15e3e1aba0f32d6b3d295e1dc818913d6e3eab4b802c7ded19cf87e8abacd7757533ce33cb50bb243abe07b25fb12e0168451c8dd44bf17de44a34f0d1f17c221dce08c10b761a2254339d1dba48d3e7a272cc680ec571955fea79ad5242ad37e05ce7e8e29580c75b1cc75", 0x80}, {&(0x7f0000001f00)="33121daa0cc7e73f4b0f739453f4a7ec3bb8b8564947526a61fbda69ea47ae7b9ff1f264a61c204c1145cbb49aa373ecd6e94ad85edaedee2811", 0x3a}, {&(0x7f0000002100)="d7e5697bd4752b47d7abee5a2a3f3de365f5b6b28ba70d9a2029804f263f150d884c9736246af9d4000c4d950ae1eeaa29cc53f2ce759dd034722203a60f18bfd5beccb105a36c5eed138f7d315e9b8079abb5c94547e75ebfdc4542575f9ce112aec0", 0x63}, {&(0x7f0000002180)="757241eb7689b5fb7a813f8e9e9f58fefbfa4669d7127f1e1d9188c5524e9a13617f77d1f99f4a415a82a56496c7b43eda5244ce4097a01cd98537c386c36a803ebce00334990ee6873793c9f608a27e", 0x50}, {&(0x7f0000002200)="fa7da6398560d85c31faf97b252e01257a3e45b4c36471e982eecdaf3edfa9d715a978266c7b818f1ab2b6b133d1797904e739d6fbe0ab436baaa58ff63d7bc0d6fd7a633fd59dcfdb0952015aac82af4d5c315b082366f31364853adde76d73c07ddda03788eaf41fbef929f8127576c201869edb82eb5fdf57c50e5ba1d3bef696d0f7554a3ae41fd736873f79d50e29996ba654529dcc8c15f974b0a483376a55e4499ea8105a7bae7c778fa858f7b0bc63402dada9478643f14ef9f877621e694b8c46c009213b7d6aeba332e7e423aaf322a33eab4fb1ab504635183aa7af7979cdd3c239f10ec9709b69e96d8b921052", 0xf3}], 0x7, &(0x7f0000002380)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}}}}], 0x68}}, {{&(0x7f0000002400)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002780)=[{&(0x7f0000002440)="550e0938c5c0f50e1483a6a392f017c7d05022832f5a26ef75d1408ab3107817f67cb8cc868c51586ce98e17b1d59d33928139ec381939a9a32d73ec858d593ec29fc410f48011e6262b148e8df06bb8ee38befbe1d5073a33037b2421badfb3657cb789fd6ca39f1088390976a11ead797e41021f748647abe35320535de8f493b8f17697dcfe3cf66a9ba38f8737b8c061ef6b259223a1009975da6da852b029ec0423e474dd1c659418e7b05195382c05b285e3d4457604", 0xb9}, {&(0x7f0000002500)="041eb6e0f6ee6080b78751b0876d7fa3050f2eec2ed35957295e59a3a9316eae03457506221122265b71d57f7367cab94c0fbc1e012983ee4fd14e5977d52ae6052f58718c9dc94daea60fdc6fafea0e38157f73b878f154443fec514ccdc711", 0x60}, {&(0x7f0000002580)="622dd9b38709b3858d808865558770be9203ec256e4e1f85a6fe4d44a9bf08adbd4334750ebb318c8ecc78a729486e3bae4f01ac4d49755016fd549bb58fa80418ff8cf13280295ee1ae131967e0c32508aa4f0402cdd1b5f9582763641412d8f26e4ad57c32f7536e11f9450ea3b8a233936167760230355e20c3d6843e82a919cc00dfc6f52f780f74c8648978018969f87e0d83f5a8af5b", 0x99}, {&(0x7f0000002640)="68ae2f9917c18a5219867384d6ec43a8ba5d456097f37b31f2c82861c91aab8e90e3ebf5be8ccd2f50524e0d9d449d2e9ea6cbd76b4805238f63b99f05f514588e2b2c5ebc4a672c05d0e70017be1bd7ee615958537188cfc496dec6b937018738ad073f29e6923a4c17", 0x6a}, {&(0x7f00000026c0)="d695f6", 0x3}, {&(0x7f0000002700)="70735c7d4f5da262c759f21a8c0405b91689682ef431d2d0b4876e09a47dc05e6180e17604f6b712086fc82cca9faa992790bd5839710e3e836499a3f72ea6a76fd5682210218da718d3b2ee9dcd7858da1b84621c8b8f1e2921e3e73f153ab2466b74a7370d956ca1f69c84e6cb9bfdf665d357725bf713175b89", 0x7b}], 0x6, &(0x7f0000002800)=[@ip_retopts={{0x24, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x44, [@multicast1, @rand_addr=0x4, @loopback, @loopback]}]}}}], 0x28}}, {{&(0x7f0000002840)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000002a40)=[{&(0x7f0000002880)="95028c718e0cba2fb94064fc184539f34fe4", 0x12}, {&(0x7f00000028c0)="c7645734b64e1d171ba3b51f7c3855e375ef0d36b9779c46f97b01574c28070341d6059a0dfb08e0c1648bc2fcec10da155d05b5127cdb0c173a4e41d109874be88f4e27b6a48d48dbf46dfd3fe963aa7170fd354443fa5c4a8293847fa3abce78e23bc1bdd3d914c1d718b3ec1d4403212a2b5d98f0aaac19cfed1dabc3b29dc7ee781eb23a03b5290cdf08aeac7db1fa8fd03261b5587640099caf1caa19d41235995c1844253d36ebde08aad06aaa14c4286f2891ff1de76f899fe9b5f23f21fb6e6f43ad2e39d7ac46667fa5", 0xce}, {&(0x7f00000029c0)="2a14b025eae10c79c23a2543bd7ceafadd18be2c57cd4968615e3feab2d4dba592a0e8474354f3e1be4b5d6a7ebf69e17bcc29ff4e08b4bb78cd55b75bf4f90425851b0a3a8ca0", 0x47}], 0x3, &(0x7f0000008b80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0xa, 0xffffffffffffffff, [{0x3, 0x4, "a9f9"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef87}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0xc0}}], 0x6, 0x600085c) [ 987.516512][ T6490] IPVS: ftp: loaded support on port[0] = 21 08:39:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000004e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:13 executing program 3 (fault-call:6 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 987.939847][ T6505] FAULT_INJECTION: forcing a failure. [ 987.939847][ T6505] name failslab, interval 1, probability 0, space 0, times 0 [ 987.982143][ T6505] CPU: 1 PID: 6505 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 987.990841][ T6505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.000900][ T6505] Call Trace: [ 988.004212][ T6505] dump_stack+0x11d/0x181 [ 988.008561][ T6505] should_fail.cold+0xa/0x1a [ 988.013208][ T6505] __should_failslab+0xee/0x130 [ 988.018152][ T6505] should_failslab+0x9/0x14 [ 988.022677][ T6505] kmem_cache_alloc_node+0x39/0x660 [ 988.027898][ T6505] __alloc_skb+0x8e/0x360 [ 988.032246][ T6505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.038499][ T6505] ? netlink_autobind.isra.0+0x135/0x170 [ 988.044179][ T6505] netlink_sendmsg+0x667/0x8b0 [ 988.048966][ T6505] ? netlink_unicast+0x4d0/0x4d0 [ 988.053915][ T6505] sock_sendmsg+0x9f/0xc0 [ 988.058260][ T6505] ____sys_sendmsg+0x49d/0x4d0 [ 988.063110][ T6505] ___sys_sendmsg+0xb5/0x100 [ 988.067720][ T6505] ? __fget+0xb8/0x1d0 [ 988.071808][ T6505] ? __fget_light+0xaf/0x190 [ 988.076420][ T6505] ? __fdget+0x2c/0x40 [ 988.080609][ T6505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 988.086873][ T6505] __sys_sendmsg+0xa0/0x160 [ 988.091510][ T6505] __x64_sys_sendmsg+0x51/0x70 [ 988.096374][ T6505] do_syscall_64+0xcc/0x3a0 [ 988.100968][ T6505] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 988.106892][ T6505] RIP: 0033:0x45af49 [ 988.110859][ T6505] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 988.130471][ T6505] RSP: 002b:00007f2a2b1abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 988.138979][ T6505] RAX: ffffffffffffffda RBX: 00007f2a2b1abc90 RCX: 000000000045af49 [ 988.146961][ T6505] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 988.154941][ T6505] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 988.162925][ T6505] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a2b1ac6d4 [ 988.171009][ T6505] R13: 00000000004caa88 R14: 00000000004e40f8 R15: 0000000000000006 [ 988.700207][ T6490] chnl_net:caif_netlink_parms(): no params data found [ 988.946006][ T6490] bridge0: port 1(bridge_slave_0) entered blocking state [ 988.957076][ T6490] bridge0: port 1(bridge_slave_0) entered disabled state [ 988.967074][ T6490] device bridge_slave_0 entered promiscuous mode [ 989.255622][ T6490] bridge0: port 2(bridge_slave_1) entered blocking state [ 989.275695][ T6490] bridge0: port 2(bridge_slave_1) entered disabled state [ 989.292672][ T6490] device bridge_slave_1 entered promiscuous mode [ 989.489830][ T6490] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 989.500672][ T6490] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 989.521494][ T6490] team0: Port device team_slave_0 added [ 989.529092][ T6490] team0: Port device team_slave_1 added [ 989.684799][ T6490] device hsr_slave_0 entered promiscuous mode [ 989.742414][ T6490] device hsr_slave_1 entered promiscuous mode [ 989.782221][ T6490] debugfs: Directory 'hsr0' with parent '/' already present! [ 989.793733][ T2640] device bridge_slave_1 left promiscuous mode [ 989.795384][ T6511] IPVS: ftp: loaded support on port[0] = 21 [ 989.800099][ T2640] bridge0: port 2(bridge_slave_1) entered disabled state [ 989.882833][ T2640] device bridge_slave_0 left promiscuous mode [ 989.888993][ T2640] bridge0: port 1(bridge_slave_0) entered disabled state [ 989.944879][ T2640] device bridge_slave_1 left promiscuous mode [ 989.951249][ T2640] bridge0: port 2(bridge_slave_1) entered disabled state [ 989.982762][ T2640] device bridge_slave_0 left promiscuous mode [ 989.989044][ T2640] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.055129][ T2640] device bridge_slave_1 left promiscuous mode [ 990.061309][ T2640] bridge0: port 2(bridge_slave_1) entered disabled state [ 990.132866][ T2640] device bridge_slave_0 left promiscuous mode [ 990.139074][ T2640] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.195207][ T2640] device bridge_slave_1 left promiscuous mode [ 990.201393][ T2640] bridge0: port 2(bridge_slave_1) entered disabled state [ 990.252669][ T2640] device bridge_slave_0 left promiscuous mode [ 990.258826][ T2640] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.329548][ T2640] device veth1_vlan left promiscuous mode [ 990.335431][ T2640] device veth0_vlan left promiscuous mode [ 990.341278][ T2640] device veth1_vlan left promiscuous mode [ 990.347088][ T2640] device veth0_vlan left promiscuous mode [ 990.353132][ T2640] device veth1_vlan left promiscuous mode [ 990.358895][ T2640] device veth0_vlan left promiscuous mode [ 990.365250][ T2640] device veth1_vlan left promiscuous mode [ 990.371047][ T2640] device veth0_vlan left promiscuous mode [ 993.552389][ T2640] device hsr_slave_0 left promiscuous mode [ 993.612232][ T2640] device hsr_slave_1 left promiscuous mode [ 993.658973][ T2640] team0 (unregistering): Port device team_slave_1 removed [ 993.669386][ T2640] team0 (unregistering): Port device team_slave_0 removed [ 993.679450][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 993.735993][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 993.795212][ T2640] bond0 (unregistering): Released all slaves [ 994.012503][ T2640] device hsr_slave_0 left promiscuous mode [ 994.052507][ T2640] device hsr_slave_1 left promiscuous mode [ 994.120949][ T2640] team0 (unregistering): Port device team_slave_1 removed [ 994.131281][ T2640] team0 (unregistering): Port device team_slave_0 removed [ 994.141961][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 994.166186][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 994.234185][ T2640] bond0 (unregistering): Released all slaves [ 994.412429][ T2640] device hsr_slave_0 left promiscuous mode [ 994.455394][ T2640] device hsr_slave_1 left promiscuous mode [ 994.499096][ T2640] team0 (unregistering): Port device team_slave_1 removed [ 994.508982][ T2640] team0 (unregistering): Port device team_slave_0 removed [ 994.518818][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 994.575900][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 994.634291][ T2640] bond0 (unregistering): Released all slaves [ 994.852396][ T2640] device hsr_slave_0 left promiscuous mode [ 994.902207][ T2640] device hsr_slave_1 left promiscuous mode [ 994.958218][ T2640] team0 (unregistering): Port device team_slave_1 removed [ 994.968606][ T2640] team0 (unregistering): Port device team_slave_0 removed [ 994.979215][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 995.025725][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 995.093848][ T2640] bond0 (unregistering): Released all slaves [ 995.241860][ T6513] IPVS: ftp: loaded support on port[0] = 21 [ 995.297127][ T6511] chnl_net:caif_netlink_parms(): no params data found [ 995.341657][ T6511] bridge0: port 1(bridge_slave_0) entered blocking state [ 995.349337][ T6511] bridge0: port 1(bridge_slave_0) entered disabled state [ 995.357324][ T6511] device bridge_slave_0 entered promiscuous mode [ 995.364858][ T6511] bridge0: port 2(bridge_slave_1) entered blocking state [ 995.371970][ T6511] bridge0: port 2(bridge_slave_1) entered disabled state [ 995.379753][ T6511] device bridge_slave_1 entered promiscuous mode [ 995.410742][ T6511] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 995.433572][ T6511] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 995.454885][ T6511] team0: Port device team_slave_0 added [ 995.463689][ T6511] team0: Port device team_slave_1 added [ 995.476244][ T6513] chnl_net:caif_netlink_parms(): no params data found [ 995.534192][ T6511] device hsr_slave_0 entered promiscuous mode [ 995.582450][ T6511] device hsr_slave_1 entered promiscuous mode [ 995.632120][ T6511] debugfs: Directory 'hsr0' with parent '/' already present! [ 995.784161][ T6490] 8021q: adding VLAN 0 to HW filter on device bond0 [ 995.791279][ T6513] bridge0: port 1(bridge_slave_0) entered blocking state [ 995.798396][ T6513] bridge0: port 1(bridge_slave_0) entered disabled state [ 995.806223][ T6513] device bridge_slave_0 entered promiscuous mode [ 995.902566][ T6513] bridge0: port 2(bridge_slave_1) entered blocking state [ 995.909627][ T6513] bridge0: port 2(bridge_slave_1) entered disabled state [ 995.921079][ T6513] device bridge_slave_1 entered promiscuous mode [ 995.941993][ T6490] 8021q: adding VLAN 0 to HW filter on device team0 [ 995.964405][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 995.982271][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 996.008120][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 996.017306][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 996.036283][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 996.043348][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 996.051926][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 996.063543][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 996.071878][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 996.078974][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 996.091268][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 996.100420][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 996.113129][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 996.121911][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 996.134625][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 996.146192][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 996.156569][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 996.167930][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 996.180727][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 996.190875][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 996.207599][ T6513] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 996.220711][ T6490] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 996.232849][ T6490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 996.253427][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 996.262382][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 996.272023][ T6513] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 996.307719][ T6513] team0: Port device team_slave_0 added [ 996.315700][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 996.332358][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 996.345145][ T6490] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 996.354625][ T6513] team0: Port device team_slave_1 added [ 996.367218][ T6511] 8021q: adding VLAN 0 to HW filter on device bond0 [ 996.424399][ T6513] device hsr_slave_0 entered promiscuous mode [ 996.462478][ T6513] device hsr_slave_1 entered promiscuous mode [ 996.512316][ T6513] debugfs: Directory 'hsr0' with parent '/' already present! [ 996.529851][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 996.542763][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 996.552950][ T6511] 8021q: adding VLAN 0 to HW filter on device team0 [ 996.586717][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 996.597249][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 996.606416][ T6071] bridge0: port 1(bridge_slave_0) entered blocking state [ 996.613546][ T6071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 996.622846][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 996.631135][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 996.640241][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 996.649416][ T6071] bridge0: port 2(bridge_slave_1) entered blocking state [ 996.656470][ T6071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 996.686231][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 996.695767][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 996.704465][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 996.713251][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 996.721662][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 996.730995][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 996.739163][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 996.754896][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 996.766604][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 996.775480][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 996.784647][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 996.793155][ T6490] device veth0_vlan entered promiscuous mode [ 996.810477][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 996.819409][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 996.830920][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 996.839973][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 996.851902][ T6490] device veth1_vlan entered promiscuous mode [ 996.867345][ T6511] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 996.879696][ T6511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 996.890107][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 996.898723][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 996.907406][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 996.947899][ T6513] 8021q: adding VLAN 0 to HW filter on device bond0 [ 996.961754][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 996.974128][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 996.987149][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 996.998225][ T6511] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 997.011708][ T6513] 8021q: adding VLAN 0 to HW filter on device team0 [ 997.049895][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 997.058019][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 997.081421][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 997.100652][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 997.118772][ T8004] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.125898][ T8004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 997.137647][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 08:39:22 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000005e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) sendmmsg$inet(r0, &(0x7f0000008c80)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000140)="e31b0ade652bbd1c0a742f712abc829eb8a4099261c10ea6bdb32b06fb7bd6f9e21e0ee297e013c7b7f84a1f01eaf4c9a050686d989155d9de777f0fe0c5b55ea039ab7f99c7923d9e22817f0b79cc8e205f6f9df6c4a0d900bbdf644cb5b28e76711da928a48e1d5347d3ac45", 0x6d}, {&(0x7f00000002c0)="bdcc816463ff65ba953c023d34e6dae6c08bf3f4ba7946443f7007f231a6edd0dd5447183e2293c0c95e6c93c20a9d38d7eb335e5db95ea1d7988e8ce1fc4e9cc4a1cd06cb48156764fc8e22bb30f3d9f1a26dab0db52b1f595a5516bab66044121c496e338fbbee62c33916e3ffc6520e01c140d65e0657d9b310105a6055fdf09f30874d52d5bc17125763426ffb698070ca64579ba466ee5dac6defbd879d9a6316b1335679eae9cc3f49b271097ec04329b818898f1dc6913fff825367a4478b93e7de77c5", 0xc7}, {&(0x7f0000000040)="decb72915b6c7cc2ab712945e5bab09a5d9e741f15081b762cb2af6c24adc8a5d54436e5e4075eb7816fd1284f45cbc7d3f42526dc8b05eadc2830", 0x3b}, {&(0x7f00000001c0)="83b3df1ed1257626982e73ba268bfe7989c30409fc0db7ff8cd67b3501704c5e02b987d9c389e02c995c98628cf1f8c9ac11dc7d7d938de91af0839b80ad09458d3d428ea63096d7ac6fbfcc12c3ead5764796f36993b18f3bf72dc13a1507fefa744cf3f27ea106d169d3d80f26dbf902", 0x71}, {&(0x7f0000000ac0)="f8407632714924959dd9b696d2a7329d6956045dfef70f7431b7516809c5830b36fbc554ac9cd84db7e193ee20e0010c971cefbc93d9fc87efdc1c35b4011dce2022ad3ee86b31f3bcce7148ce2ca9f855dbd9c1a03b476b368ed9119ad7b156ff9b9b3d60097e0e1dca200e5ff45bbbe9d38cf923265492de6c892f21f7160000b9849cab684ae230dfce0cf8f6cdcf70fc20beaa13cd7309430a1a6aced2e008c6ee1676009b0b4c7b64ddf009d3e4cfb16c5738385514fc93aeea80843893528f17008b09f98e262ccaf8858b7529323021045b389aab3f0fcb5d8c60ea876815f853a42dd423cc787d7f117985cad9437a711a2eebe83a8059466f01677d99df4f7f5a188111fba3e6a4586e60404d95784d1da4a7824efb7a8d2e61341499b8f2c8ffcbfedabc461fb66497e83f3c2ad5b6f71a47e503e200ed4976f6bbc3f86001d9dd473017abcb7ef8ed1700cde775bc40aaab0751c3264bfbdf3c0359abd9c960d1c394bd0c4af124f13bf4c6fa041bad2b6dd5a9c2300e6b0c614a797171265d3ad888e9585773fb6140c971093845e0d420626cbffd959d38f65023d8a067493dfbabebcebe2a564999457163336bd92271c551313615784da74703e5ba88cd65ea05812141769056c86f79369776b80c79cbb7757296bf587f9b4f0ebc27ef3860caeea3804e116b7fbcadde3c908117e8faaecaf10643158281d8904206489564ec5987df5cfff7db2b077a0be9dbf37a0e02f46c92b534ebded3db7f933da03f282f584008cb71f0da45308f9f38bf97119da61b95fefb8b51d3edb910ad25db81fb0ae1fa629569e93a65fe316aacb55756f2a4cd4c76310f414319e705654048e10859f8f22e7ca55a5e09d7c17045f44c0f7554b6a7fd71f08b4fb1b8857924b63cb151ef6c19f967682d04005ac2c865058d0b74192f61ec1f4820b011c8dc31dd07ccc146304c2bfc9a41a390a9323ac5e0590207a098e00da1937457308f8f713f9609d309901b90dedeaf22f7c9720b51636da657c828fed342de02eea9ab85816a8d8d27f09770cc663bbcac6a0df8bdeb1de44c87829cf5b3911c23347613a8e10f16fa513344e87b3f9eaa6180077160e0388b2dbb1f7b97f3d581a13acdecf11d2b5d1e0ff5e0dbcbd74c7f37fab6cd69b5f959f03e8334cd0ce263891b262d0f83c664954d5fd33f980d1602545151fcc91303c88ae4594aecbeb1fa3d96fc3cacb67fa5b990368bade78f445c96885a2743165d4d2709a2bf4b023b6bc5daeb9ee6399cc54147cbff6b7c07b62afac7e528dcf2c76a06e1488ada73308485f98c1afc4862db88cb5b1919a0582803abfd4a8af804c6fb126625673f85b6044a3dfc6693e5294ebfe12dda51c080aaa26b1e82018cb73c1987aae021c97e4dc4ae70c9d16043b317ff655b69a81b1ea384dd4ac838d716a436689738cb231334b629beebb507ced503e27465ac28212fb65dfe36eecdb5e129a32c83c17d01b7a8a80464529533a46ca13917ad64ac4a9dc6ad2dcb1cd0132ba13a22b849c738e871a6382cce054cb507902e7b21694391059ff5d854a768a385679de2b05149d8f51a7dd473c04cc5fac0a567cf4c31278b8a5a244cced7cbd517e7856461fa4a018946edec5fc83ad0e9a85701c4d577f0b92755d5ef6da7816686e9b18c9031cf6341f1f9d5b2979fe0cc17fdd0fb2a9c5b3f6149e1ed0ba4fa22fa501b3127a3a5e801dc876b575a7176b4d96dac48afecf1e397e1d43806e31702126f17bb6586eb2e90b796dc4f0fe6afd4f366f30f5ce81981f3c4dfdc97387174dc65d3d0094762797ba74d68a35d1924251bd44f09cc8c497b26069271e5a54331f53847788e15cc7cd7d8f31537d425eba80e70d0033895743592154cbe9817f13a728e5e1dfa31578cbf95ae33e0a467ac856ff4422de060226fe97da3d75c317f3de339e4dd5493451304056e0e439189d405b03af86b6695ce67358e9159ed788f469a803b0018a5234b0d129e52cd17f3a3f2c7ca22ba6caa9d5a04cf8410479cdb8507862814877bbd84bbd83bae56a43498ed254a44c27048991d63143a7db2a94115d097d48ed49ae956b882ab42753e01f20f0b7f47b75996dd3c8ec50b93824bb2332b63e040b50e9a41fcd9544098574d563572ff20b6c23f6a34ce7f81f057bfc3a24d4fddf97cef617420daaf5dc80e0d5d8be1ccb4a728131d6f63173be3eff5da095d53e1e3326550e59d14bb48054651e50381b914deb622e99919d7423146ebad739bee7ef4dab7bb7518bc5696f510d68ef557ce7a57f3d91dd5445aaa4afcb66304e44f2acbf88ce8dd3b1927b19235bde83f88c7ec10fa3931d96a02d02c0fd237077ee2f23ea38b3f3d73659c0b1343475e6ec65b668bb5899adb1f96cf6e6f733accd52638c8a14d3bd05e5c2e91b80ce25a666c2984864bbfb26c60e59709bd31ee00edb04561093c0466629e6fa064eb826eba197df544fe84efdf6ed3b918a002edde00643cfc4daaa08822980a62a73bf84cce8d0b24a4d949472be8099e0182da3d3b30f91bdc30b808a59058f4d81b76407da6477e5545caeb95c9e33c3e2b5c0180cab813042cc686d6af416436f8e644d467a1029aa77795fde8c252919fc3b3a989dda875bf5bb33ab08d503226f069b61d8e452104b91070b723f698b4e79f7c0fad6ddf10e6f3c622bcf675caf46dfdeec52f56ca2ff42d6a0db0fd775cecd7b808aa02dca3984462a2e883c617fae37815199d5a6d97f498d3d9f6924e6ac21210257ddd08fff6f1dd59f1dea33258b80585861fadb2f073a4bd125169a9fdb3598cfcf9abd8c77b6671f3c08059db28d5a8a3bc40667a4492eb71fd20c08831709937c54e1199db7e5673a5d172ef480017825530c99daa13c7e6621433fa243140bc91ff938ced5952381fe6ee77b8e3a35cf20150dd3365f3dd2ed3f9ebbf1b857f4855d56add803dd21b67eac78c5d3a5eb660f2e9b7eff673d139e21d29a8395ae8fdad08fd087815d109f881280acdff3583fe00898e86cc2187648991cdec0e3011179c5284d89ec1c8050ee027e950ce05c1fc23759ed9a83044539a0280785b1080da30ecc6c5dc2d7ed670d1e0ec34238e45b8fd916778a0ceb55990d27033507e6d828e2ba870e94143e0e7557f272705b55af6c2a81ba99cbf4195419eadd040e7ad5be445da3d79a437e533f7fec9d7e899b26defd6b3befd6667121b09594b7abe8bf1593759864b3dba0b74565b1e7f094eb92348cb0a3a91953be8e0b15e5a55b7f5224ccf3db88170f0f229f2e52b96ab8b40390d9734d9c120a7c254a0bf7d9750754be9ed76e004190a6e28c4a923f52040c0fa684e0388abe4ff3f838af31997326b1d0770294e4c13a3302895129c0afbef0e45297a43e7fdb83d288e597e66a24361050bd10f2232d81ba7e07f8fc203fac348d0c7f32b161754db713e88ac96bfec05acf49d9c27eff10e689c837d66898fd607b31947a048e75d3fd2082fb757e257ec449fb2d62943c135917926e0900f6651f14ec665661bed2772506c8c9d89a78a8470ec0bcda2fdabf55e595ba2c71532ace1e8109a970d398b82363406d196361280056d89a04ee44d988283a8a21c995c6237e87d55510f5d624097c67b24c240161b5a9693a1d2ff13ca478bf6ccf1110e6ce99d02b96191079e4bc092e8bf098265dde829cfe45269094e960c721ee7793bdf5880c29f277a68c61132e9b04f1b0b0015c9dc2e9dbbfff9469e182ca1690add1237bc16ee64d429e1de86fe0d1da0d9ff091a5cf34c5b95763d4dc426578f6a87ad858461bd61dd6ae58ad52e0152e2760a3d926135fb7ecfa2092e542ef784259df90c7114984e708211fe1281187d2446e7e7cd59d4513fbc6be9b930ade2e841e013ba6918e8a8951e4678da9f946a2817119d102914bce2dc418c05e9471c4e7c2e97bc243688219d86048dcd1c3329dcc5361ce9aed4d586f0c7e5f039bd070ed1727940f26ce9e5fd80b1e25e10820bac061f0b5b41623a655881b4c92bd77a4f2ee359a584059a03d645056bb374eb5314fff674fe7f904f271b9d6e3634a38d7044c340a81d57b0d8f3ee923a76ffcbeee09db1921c6c7a458a04ebb1742331e693dd4cc884569a9d925c34d0f86252c17aa50e3678125fbf2dc5632e9fc998f344c2a77f64b32dc94061fe924b56a87982fd21d7d2348d5dd9e65222fa9431acf867669cd713337da1419ab44e320ba87b0f875db5ac8c41f97fd1ba4cd5416533fc18b344c73df8db6285fe90225fa37c6d13abf165e53aa4f0b7e94699569a4aa6e900c18ed1df292dd9392bb718b11522aec65e29519f4c2d16039168afce66d441902cc1cb8f79bc1a7d7f3da04b9959d002d33bd64c46164879feaa7dfc72aba8e5e8edbfd6458d826b288270ae873ffb6c9a3747e4be55a002c1ae77d54a33fc4595b6a3cf2d88270f8518f125f2c76be3c5b6b3130fdb6be88c865c2e2e78632db6dfac9061e59a7e53462245b0da6842957568a8097cf9368959f35960c566a11f381ce1250aae8cfd831c02fc9359b3f1829ba7051fba7e54ea7e23e2480f54c08383a969d9fb1bfe2832ecabf2ae05b504b49c877f54d1716421707da5f166e3b3b9aae2d37edad5a9c88dc1c972550009ee948846ea338314831d045ad8f935c693e78d8767c126d9fb8b95c8768c0af0e3ffd6ae52763237282c4a649231d75d3bd2b8c9515deb783508a3b814fdfc157afc3c5ca45b5d93f709638101662119b3b1ebdb81719110478e2686688ac22a79c4bf8daad0e8571a2cd3bec71c09203cd4b2da88c9df87e494bff908d2cc857d88bf66462f1e578b6a66e53455c8c33765f56eeceef3388c7c3989b9c6681b372e452b1071f9a374069e555f6ddc984cadad752f6e22dd6df350d4c4e5316e60377f9341e22f8bf460c63d3b770ba15b8e96975a317d20d85ec094da2cc03ac80dad548b6f3f300fc6caf7bb335b4fa146f8bc4f4c33c3269b168bdc6a784373e77045011da46e9c0d506948d6092ed32ff686d935892c8e051b2631aa2dc3246dcddfa961565885f3f3fc654d9f3d6d84417063a0a83ee0a43cd2c248dd649f345189849e322cde6905bb6b59c5390e565ec25b347dbc367477772df2cc075457a1a3c4c70ae8aa92340f8729199309a3f198c6d58800082f4f818426465abf8802c9de19318f554b68008934939815f744d9e3c56dbea225c336e807909f0f7e7b3ee8ea987135ff28e26fa1b327f17cbbc79739f46951fc4599c2f9a5247d0a024d78f01d99b3b8264d1a5a9cd43d8dc0a7a3c7fb21b0e7273120012dbeb56b6a027fe7b7da4e06d624c1900b6ccb2af348d3dfb66275bfa1323a50a8c4f7abc2f2f2d9a5271d86617c2cfba3942598f21ed1ffa1c07099a0aa1c3a59a4d6d84fb0042d20074f714d2b7af22eb06c8d47c9fba78a894530e5a1011a5154daf5049542d405c9ae5d492d38a5fb970e8108cf645947fbbaa03377106c62b4ce969c48f5de4900da3bce4f7062b85feee1df0864eba005733f5baa9c911afd93df51430ef90cb02d5394e2b25b83812d77525326ca926798f8037dfe864a0e945154e935405865c806a7c59d09214450fa59fcaf7afae0ff5b86906c31cb2debb10965987f900e9624ba0db6cb1ae1f830e58b175877022d72b12e1fe6df1a5dfdf307d6c11e868b16cc5c87e9c46523aad957f07320445687908feb29ac439a105503bacd", 0x1000}, {&(0x7f00000003c0)="131500a017e9f471a520f26115b7131a6e5b25625e6a03cca52c3400018a952036d7dc2128dcb4336c6faae1824ef866100528573b2df6be1ae2d2393ad7994f0f28a0d55d69f39bd2b153e176982c65c5e92598b0e96e7f7ec609ed08c7e4080b097c4e1a9b35e3", 0x68}, {&(0x7f0000000480)="7e7f0bd706f56100fa9d25dccdbcc1886abb4425f9663cc0f83ccf8781d450b4e3b737ed556a25562a90bf23b67e00d6f258f770d19db46fd6c3c05864f313af1eb2fd8fd93f7dd4b76910769cf29d1ec4ba62a473336b0dba86c5d5d0dc49d03b2080993ee6a63e34fc26d96afaf9c3a549e7cc4d96", 0x76}, {&(0x7f0000000500)="b37ef511a1d7d6cd447fc0ab4f4db4631888d3e39fe9c24189e455447e6900319e509ec056d7ec3cae37d426aeadd7fa453b67ff74f399e27eae6acb41bc757fff32a7918d4ccffbfc223a7c4868f8dd4fe6911f9e6eef91995c9cff3d34c6b962a8f8", 0x63}], 0x8, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x68}}, {{&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x4}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000000680)="183af2bdb07a1b9717efc8dd22ba46eb20ddd60bdffead4325b5afd710f6b26e61a1be2983741df7391b243eb9c14b0b199df035ab9ea764685a6db9b97ed0cb5dfd6f589bdf6543dcabffd85dee3569b847241c04b9b5d8c3deec6e33f4d4a3fa6529eb61c93e8fbb0bd7636a490dc7e17f2cbde304d8a4001121a3d7a39a095e6a2102be40588cbef9a0a892a359f05af8644d3b534a930424e7431b13b658e63907f2d53826d7237c6f94c8cdefd231cbde9786b7c9650ab17b7e10f480e833998c8d0e72bc432cd31a4b8405daedfddd912d4b53e42869e4c45b13dd5e", 0xdf}, {&(0x7f0000000780)="9a34c82f4ad6009b0f93fd888db18214f8cf72dc13c37b214b545177150e8e4fb7b6b8801c85f5a7227e638c7e51de26d8f3ce63c9371640149bf76f58db5cd8dc7d86b5f122a4c9212ba3ebe9442ffebba99629834a9d2afa77b3334f2d803bc896717e35d28ebcc188f2cb6f449a351b8c7c4111f7666e85b0691b322682244ed051a2291ed4bbd42c52b212e594285a8fc83cd6d97dfd593a0df27b04bd14e6eb3ba0b6059ced551fa922fc7f", 0xae}, {&(0x7f0000000840)="1de999bfc5f5aa70", 0x8}, {&(0x7f0000000880)="373104ae7e954bd5204260500aeed16c1f9329f6a215c4256ebd0db4a3e20c019546bd9d487a6180a77fbc22b9aa762e47f05ccc39ffefb3a171a33a571fff37d11818a4c6f5976ae66cc834de929a082bafc4682449893ae8faca2a32b2736d1d2342861d4a753a33b56bd8f0622213e7e568244f681a681645c7d964639854006f0e42364d927a6a20b24064435bfa071bf7d80cf27a5f5469802590f81144e18a7308c09be74e93a1f0c648d70b94213b2abd252f1f863d189894ace989e9aa877e8cf3cb0798d928e72f4ca76baf075203582f2d", 0xd6}, {&(0x7f0000000980)="4fd38492e522042074865251dd03e5330ff5a23b12fb58fd94a2ae49918ae3041f6009a60e9d79ed597c3219a4fd4edd9b70f483cd51723ff07828ca834f00ade4214dbe3ee2a50f1af852e104de03b429c8e4170e2b1ac876c5e95a2b7f3a25a891dec5914e1138a55a7ecef73f48405f6b44e2eac259272c107cf20248e1fdea91af77f9a6516012e8cc5bf982b0120c7739bffa80623f4fef211ea3023e9f3e67e7560056a2fc1a7ef4b15edbd6ac4219e225e8697341fe4d9f6f82a076a2d304769c7821b92ef4ca920cd522c53655048fb98d809ff5649e6bd83378fb110ec33c1a9a", 0xe5}, {&(0x7f0000001ac0)="af8ae174deaf3c0b32c0bb120f76073a89ae5680c12fd1cfef69fbcb4417c48b642bdfd6b6e3c0218a18f4af35d00c48507242fbe8078730d03af019ef464a857ed06b45bb10c0b693db229198da0cbe878f98be95e50f46430af5a5ece98399c114c7f91c25791f819ff67911f0f58ba44253e1aa40b4dc3227221e2500a71e868babd495cb363fc195e6fd6eb34a91fa66639bb891fe0d3509dba71fc0fa8a2bda8f", 0xa3}], 0x6}}, {{&(0x7f0000001c00)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001c40)="f06d20c01b1ccbfc15a8fcec379c8024aabe5c612192cd2f9e9259e6b8f4", 0x1e}], 0x1, &(0x7f0000008e00)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x6e, 0x1, 0xf, [{@remote, 0x8}, {@loopback, 0x12a}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}]}, @timestamp={0x44, 0x20, 0x45, 0x0, 0x0, [0x3, 0x1, 0x2440, 0x80008000, 0x6, 0x7, 0x1]}, @noop, @timestamp={0x44, 0x1c, 0xc6, 0x0, 0x4, [0x7, 0x200, 0x7, 0x8, 0x2, 0x800]}, @cipso={0x86, 0xc, 0x2, [{0x2, 0x6, "9c1a44f4"}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x24, 0x18, 0x3, 0x4, [{@remote, 0x1}, {@loopback, 0x8001}, {@local, 0x6}, {@multicast1, 0x1}]}, @generic={0x82, 0xe, "a4ac0724a6c074274eefa0e7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x100}}, {{&(0x7f0000001dc0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002300)=[{&(0x7f0000001e00)="9be8a0a30e2c7f0799076e9a7e2a8da9f89200ea0354a513613d854d46abfada81ef75e0dcdcea8ec023d31a3604d72948e5c48c6ee546621bba49524f3a27b2e0df6744edd7b5b033e952dcb4945f5bc47d47679cd69416dde8ea71751b7fdcb088e15f51bfb8e75e462216373a3f31c28e3aedb2590a5eb88c0cea19643db3f6dfaa51850086372665f3089bb5310d881fa674c4e83a674589de6df6f8cc4660e06d13aa14490df4164d8c2e3168366d606f163427306656df48a8ec5db21d164527171092b0d44aa14c81990a3a988122bc0d439394449497feaea1293e9bb5d42755017cf1fbd7893e95e1e7b567aca85e61", 0xf4}, {&(0x7f0000001f80)="7c386cc044fec1ee527b64047c0c2c7a904e1f2f6231c15cd5cfa7a62833a6eb15eda84db2a474cf7a937b2bc2ffca4ec238da5d07ed3c250bca767a192330bd94ce74ff06415823fc29ef044b171abadc2e52fa0ae8353896652a7061aa50726e4232f787e6903b7f1cbf0872422ce9d1ee460d49ad11b9c942766c6a68dba1d8064fb442d652570b2dd73736d9e9f58a82624a694c3af60ae3947103383df42749a3ae43850db6562dc3aa0017d87c4154cc6d4a75d90203c6ad49617098f0df1dfed54e0c657495300c22a701efdc7ed40390c58f9ffcefcb4c4b33eceadc401b10231f8dbe29e6fdf89a05d92838a77f", 0xf2}, {&(0x7f0000002080)="df6f6964d9d4b4aa92384e41120fb3e0458ad476e15e3e1aba0f32d6b3d295e1dc818913d6e3eab4b802c7ded19cf87e8abacd7757533ce33cb50bb243abe07b25fb12e0168451c8dd44bf17de44a34f0d1f17c221dce08c10b761a2254339d1dba48d3e7a272cc680ec571955fea79ad5242ad37e05ce7e8e29580c75b1cc75", 0x80}, {&(0x7f0000001f00)="33121daa0cc7e73f4b0f739453f4a7ec3bb8b8564947526a61fbda69ea47ae7b9ff1f264a61c204c1145cbb49aa373ecd6e94ad85edaedee2811", 0x3a}, {&(0x7f0000002100)="d7e5697bd4752b47d7abee5a2a3f3de365f5b6b28ba70d9a2029804f263f150d884c9736246af9d4000c4d950ae1eeaa29cc53f2ce759dd034722203a60f18bfd5beccb105a36c5eed138f7d315e9b8079abb5c94547e75ebfdc4542575f9ce112aec0", 0x63}, {&(0x7f0000002180)="757241eb7689b5fb7a813f8e9e9f58fefbfa4669d7127f1e1d9188c5524e9a13617f77d1f99f4a415a82a56496c7b43eda5244ce4097a01cd98537c386c36a803ebce00334990ee6873793c9f608a27e", 0x50}, {&(0x7f0000002200)="fa7da6398560d85c31faf97b252e01257a3e45b4c36471e982eecdaf3edfa9d715a978266c7b818f1ab2b6b133d1797904e739d6fbe0ab436baaa58ff63d7bc0d6fd7a633fd59dcfdb0952015aac82af4d5c315b082366f31364853adde76d73c07ddda03788eaf41fbef929f8127576c201869edb82eb5fdf57c50e5ba1d3bef696d0f7554a3ae41fd736873f79d50e29996ba654529dcc8c15f974b0a483376a55e4499ea8105a7bae7c778fa858f7b0bc63402dada9478643f14ef9f877621e694b8c46c009213b7d6aeba332e7e423aaf322a33eab4fb1ab504635183aa7af7979cdd3c239f10ec9709b69e96d8b921052", 0xf3}], 0x7, &(0x7f0000002380)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6b}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}}}}], 0x68}}, {{&(0x7f0000002400)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002780)=[{&(0x7f0000002440)="550e0938c5c0f50e1483a6a392f017c7d05022832f5a26ef75d1408ab3107817f67cb8cc868c51586ce98e17b1d59d33928139ec381939a9a32d73ec858d593ec29fc410f48011e6262b148e8df06bb8ee38befbe1d5073a33037b2421badfb3657cb789fd6ca39f1088390976a11ead797e41021f748647abe35320535de8f493b8f17697dcfe3cf66a9ba38f8737b8c061ef6b259223a1009975da6da852b029ec0423e474dd1c659418e7b05195382c05b285e3d4457604", 0xb9}, {&(0x7f0000002500)="041eb6e0f6ee6080b78751b0876d7fa3050f2eec2ed35957295e59a3a9316eae03457506221122265b71d57f7367cab94c0fbc1e012983ee4fd14e5977d52ae6052f58718c9dc94daea60fdc6fafea0e38157f73b878f154443fec514ccdc711", 0x60}, {&(0x7f0000002580)="622dd9b38709b3858d808865558770be9203ec256e4e1f85a6fe4d44a9bf08adbd4334750ebb318c8ecc78a729486e3bae4f01ac4d49755016fd549bb58fa80418ff8cf13280295ee1ae131967e0c32508aa4f0402cdd1b5f9582763641412d8f26e4ad57c32f7536e11f9450ea3b8a233936167760230355e20c3d6843e82a919cc00dfc6f52f780f74c8648978018969f87e0d83f5a8af5b", 0x99}, {&(0x7f0000002640)="68ae2f9917c18a5219867384d6ec43a8ba5d456097f37b31f2c82861c91aab8e90e3ebf5be8ccd2f50524e0d9d449d2e9ea6cbd76b4805238f63b99f05f514588e2b2c5ebc4a672c05d0e70017be1bd7ee615958537188cfc496dec6b937018738ad073f29e6923a4c17", 0x6a}, {&(0x7f00000026c0)="d695f6", 0x3}, {&(0x7f0000002700)="70735c7d4f5da262c759f21a8c0405b91689682ef431d2d0b4876e09a47dc05e6180e17604f6b712086fc82cca9faa992790bd5839710e3e836499a3f72ea6a76fd5682210218da718d3b2ee9dcd7858da1b84621c8b8f1e2921e3e73f153ab2466b74a7370d956ca1f69c84e6cb9bfdf665d357725bf713175b89", 0x7b}], 0x6, &(0x7f0000002800)=[@ip_retopts={{0x24, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x44, [@multicast1, @rand_addr=0x4, @loopback, @loopback]}]}}}], 0x28}}, {{&(0x7f0000002840)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000002a40)=[{&(0x7f0000002880)="95028c718e0cba2fb94064fc184539f34fe4", 0x12}, {&(0x7f00000028c0)="c7645734b64e1d171ba3b51f7c3855e375ef0d36b9779c46f97b01574c28070341d6059a0dfb08e0c1648bc2fcec10da155d05b5127cdb0c173a4e41d109874be88f4e27b6a48d48dbf46dfd3fe963aa7170fd354443fa5c4a8293847fa3abce78e23bc1bdd3d914c1d718b3ec1d4403212a2b5d98f0aaac19cfed1dabc3b29dc7ee781eb23a03b5290cdf08aeac7db1fa8fd03261b5587640099caf1caa19d41235995c1844253d36ebde08aad06aaa14c4286f2891ff1de76f899fe9b5f23f21fb6e6f43ad2e39d7ac46667fa5", 0xce}, {&(0x7f00000029c0)="2a14b025eae10c79c23a2543bd7ceafadd18be2c57cd4968615e3feab2d4dba592a0e8474354f3e1be4b5d6a7ebf69e17bcc29ff4e08b4bb78cd55b75bf4f90425851b0a3a8ca0", 0x47}], 0x3, &(0x7f0000008b80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0xa, 0xffffffffffffffff, [{0x3, 0x4, "a9f9"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef87}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}], 0xc0}}], 0x6, 0x600085c) 08:39:22 executing program 3 (fault-call:6 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 997.146523][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 997.164399][ T8004] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.171476][ T8004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 997.210865][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 997.231596][ T6536] FAULT_INJECTION: forcing a failure. [ 997.231596][ T6536] name failslab, interval 1, probability 0, space 0, times 0 [ 997.232806][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 997.262261][ T6536] CPU: 1 PID: 6536 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 997.271148][ T6536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.281208][ T6536] Call Trace: [ 997.284572][ T6536] dump_stack+0x11d/0x181 [ 997.288977][ T6536] should_fail.cold+0xa/0x1a [ 997.293640][ T6536] __should_failslab+0xee/0x130 [ 997.296079][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 997.298542][ T6536] should_failslab+0x9/0x14 [ 997.310956][ T6536] kmem_cache_alloc_node_trace+0x3b/0x670 [ 997.316287][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 997.316759][ T6536] ? memcg_kmem_put_cache+0x7c/0xc0 [ 997.329835][ T6536] __kmalloc_node_track_caller+0x38/0x50 [ 997.335623][ T6536] __kmalloc_reserve.isra.0+0x49/0xd0 [ 997.339586][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 997.341075][ T6536] __alloc_skb+0xc2/0x360 [ 997.341108][ T6536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.359467][ T6536] ? netlink_autobind.isra.0+0x135/0x170 [ 997.365210][ T6536] netlink_sendmsg+0x667/0x8b0 [ 997.370051][ T6536] ? netlink_unicast+0x4d0/0x4d0 [ 997.375010][ T6536] sock_sendmsg+0x9f/0xc0 [ 997.379347][ T6536] ____sys_sendmsg+0x49d/0x4d0 [ 997.384119][ T6536] ___sys_sendmsg+0xb5/0x100 [ 997.388731][ T6536] ? __fget+0xb8/0x1d0 [ 997.392808][ T6536] ? __fget_light+0xaf/0x190 [ 997.397409][ T6536] ? __fdget+0x2c/0x40 [ 997.401568][ T6536] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 997.407878][ T6536] __sys_sendmsg+0xa0/0x160 [ 997.412412][ T6536] __x64_sys_sendmsg+0x51/0x70 [ 997.417196][ T6536] do_syscall_64+0xcc/0x3a0 [ 997.421711][ T6536] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 997.427599][ T6536] RIP: 0033:0x45af49 [ 997.431502][ T6536] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 997.451283][ T6536] RSP: 002b:00007f2a2b1ccc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 997.459692][ T6536] RAX: ffffffffffffffda RBX: 00007f2a2b1ccc90 RCX: 000000000045af49 [ 997.467689][ T6536] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 997.475643][ T6536] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 997.483639][ T6536] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a2b1cd6d4 [ 997.491609][ T6536] R13: 00000000004caa88 R14: 00000000004e40f8 R15: 0000000000000006 [ 997.512032][ T6513] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 997.542188][ T6513] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 997.586101][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 997.610167][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 997.620117][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 997.661154][ T6513] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 997.700942][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 997.709491][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 997.744205][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 997.770723][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 997.785873][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 997.794684][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 997.802190][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 997.810009][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 997.818722][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 997.833503][ T6511] device veth0_vlan entered promiscuous mode [ 997.854974][ T6511] device veth1_vlan entered promiscuous mode [ 997.931622][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 997.943479][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 997.951972][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 997.966117][T26499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 997.989837][ T6513] device veth0_vlan entered promiscuous mode [ 998.000133][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 998.009295][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 998.030406][ T6513] device veth1_vlan entered promiscuous mode 08:39:23 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:23 executing program 5 (fault-call:6 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 998.039072][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 998.046922][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 998.063166][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 998.130932][ T6564] FAULT_INJECTION: forcing a failure. [ 998.130932][ T6564] name failslab, interval 1, probability 0, space 0, times 0 [ 998.170701][ T6564] CPU: 0 PID: 6564 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 998.179394][ T6564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.189503][ T6564] Call Trace: [ 998.192815][ T6564] dump_stack+0x11d/0x181 [ 998.197158][ T6564] should_fail.cold+0xa/0x1a [ 998.211755][ T6564] __should_failslab+0xee/0x130 [ 998.216635][ T6564] should_failslab+0x9/0x14 [ 998.221209][ T6564] kmem_cache_alloc_node+0x39/0x660 [ 998.226393][ T6564] ? __netlink_lookup+0x24e/0x300 [ 998.231423][ T6564] __alloc_skb+0x8e/0x360 [ 998.235787][ T6564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 998.242016][ T6564] ? netlink_autobind.isra.0+0x135/0x170 [ 998.247671][ T6564] netlink_sendmsg+0x667/0x8b0 [ 998.252454][ T6564] ? netlink_unicast+0x4d0/0x4d0 [ 998.257376][ T6564] sock_sendmsg+0x9f/0xc0 [ 998.261694][ T6564] ____sys_sendmsg+0x49d/0x4d0 [ 998.266455][ T6564] ___sys_sendmsg+0xb5/0x100 [ 998.271054][ T6564] ? __fget+0xb8/0x1d0 [ 998.275112][ T6564] ? __fget_light+0xaf/0x190 [ 998.279693][ T6564] ? __fdget+0x2c/0x40 [ 998.283834][ T6564] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 998.290060][ T6564] __sys_sendmsg+0xa0/0x160 [ 998.294554][ T6564] __x64_sys_sendmsg+0x51/0x70 [ 998.299358][ T6564] do_syscall_64+0xcc/0x3a0 [ 998.303891][ T6564] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 998.309805][ T6564] RIP: 0033:0x45af49 [ 998.313733][ T6564] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 998.333544][ T6564] RSP: 002b:00007f3666a64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 998.343023][ T6564] RAX: ffffffffffffffda RBX: 00007f3666a64c90 RCX: 000000000045af49 [ 998.351202][ T6564] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 998.359268][ T6564] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 998.367231][ T6564] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3666a656d4 [ 998.375189][ T6564] R13: 00000000004caa88 R14: 00000000004e40f8 R15: 0000000000000006 08:39:24 executing program 2 (fault-call:6 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:24 executing program 3 (fault-call:6 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000006e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:24 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:24 executing program 5 (fault-call:6 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 998.542346][ T6570] FAULT_INJECTION: forcing a failure. [ 998.542346][ T6570] name failslab, interval 1, probability 0, space 0, times 0 [ 998.559006][ T6570] CPU: 0 PID: 6570 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 998.567637][ T6570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.577715][ T6570] Call Trace: [ 998.581013][ T6570] dump_stack+0x11d/0x181 [ 998.585403][ T6570] should_fail.cold+0xa/0x1a [ 998.590012][ T6570] __should_failslab+0xee/0x130 [ 998.594916][ T6570] should_failslab+0x9/0x14 [ 998.599451][ T6570] kmem_cache_alloc_node_trace+0x3b/0x670 [ 998.605225][ T6570] ? memcg_kmem_put_cache+0x7c/0xc0 [ 998.610615][ T6570] __kmalloc_node_track_caller+0x38/0x50 [ 998.616265][ T6570] __kmalloc_reserve.isra.0+0x49/0xd0 [ 998.621657][ T6570] __alloc_skb+0xc2/0x360 [ 998.626116][ T6570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 998.632394][ T6570] ? netlink_autobind.isra.0+0x135/0x170 [ 998.638156][ T6570] netlink_sendmsg+0x667/0x8b0 [ 998.642958][ T6570] ? netlink_unicast+0x4d0/0x4d0 [ 998.647923][ T6570] sock_sendmsg+0x9f/0xc0 [ 998.652268][ T6570] ____sys_sendmsg+0x49d/0x4d0 [ 998.657071][ T6570] ___sys_sendmsg+0xb5/0x100 [ 998.661707][ T6570] ? __fget+0xb8/0x1d0 [ 998.665809][ T6570] ? __fget_light+0xaf/0x190 [ 998.670437][ T6570] ? __fdget+0x2c/0x40 [ 998.674538][ T6570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 998.680797][ T6570] __sys_sendmsg+0xa0/0x160 [ 998.685319][ T6570] __x64_sys_sendmsg+0x51/0x70 [ 998.690091][ T6570] do_syscall_64+0xcc/0x3a0 [ 998.694613][ T6570] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 998.700525][ T6570] RIP: 0033:0x45af49 [ 998.704508][ T6570] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 998.724114][ T6570] RSP: 002b:00007f3666a64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 998.732533][ T6570] RAX: ffffffffffffffda RBX: 00007f3666a64c90 RCX: 000000000045af49 08:39:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000007e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000008e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 998.740613][ T6570] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 998.748595][ T6570] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 998.756583][ T6570] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3666a656d4 [ 998.764565][ T6570] R13: 00000000004caa88 R14: 00000000004e40f8 R15: 0000000000000006 [ 998.775448][ T6574] FAULT_INJECTION: forcing a failure. [ 998.775448][ T6574] name failslab, interval 1, probability 0, space 0, times 0 08:39:24 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 998.790767][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 998.831296][ T6574] CPU: 1 PID: 6574 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 998.840004][ T6574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.850084][ T6574] Call Trace: [ 998.853382][ T6574] dump_stack+0x11d/0x181 [ 998.857721][ T6574] should_fail.cold+0xa/0x1a [ 998.862329][ T6574] __should_failslab+0xee/0x130 [ 998.867194][ T6574] should_failslab+0x9/0x14 [ 998.871772][ T6574] kmem_cache_alloc+0x29/0x5d0 [ 998.876539][ T6574] ? __rcu_read_unlock+0x66/0x3d0 [ 998.881566][ T6574] ? memcg_kmem_put_cache+0x7c/0xc0 [ 998.886797][ T6574] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 998.892780][ T6574] skb_clone+0xf9/0x290 [ 998.896963][ T6574] netlink_deliver_tap+0x428/0x4a0 [ 998.902080][ T6574] netlink_unicast+0x43a/0x4d0 [ 998.906961][ T6574] netlink_sendmsg+0x4d3/0x8b0 [ 998.911778][ T6574] ? netlink_unicast+0x4d0/0x4d0 [ 998.916803][ T6574] sock_sendmsg+0x9f/0xc0 [ 998.921133][ T6574] ____sys_sendmsg+0x49d/0x4d0 [ 998.925916][ T6574] ___sys_sendmsg+0xb5/0x100 [ 998.930539][ T6574] ? __fget+0xb8/0x1d0 [ 998.934749][ T6574] ? __fget_light+0xaf/0x190 [ 998.939351][ T6574] ? __fdget+0x2c/0x40 [ 998.943429][ T6574] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 998.949687][ T6574] __sys_sendmsg+0xa0/0x160 [ 998.954209][ T6574] __x64_sys_sendmsg+0x51/0x70 [ 998.958977][ T6574] do_syscall_64+0xcc/0x3a0 [ 998.963494][ T6574] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 998.969431][ T6574] RIP: 0033:0x45af49 [ 998.973365][ T6574] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 998.992960][ T6574] RSP: 002b:00007f2a2b1ccc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 999.001368][ T6574] RAX: ffffffffffffffda RBX: 00007f2a2b1ccc90 RCX: 000000000045af49 [ 999.009335][ T6574] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 999.017351][ T6574] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 08:39:24 executing program 5 (fault-call:6 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a1000000ae3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 999.025327][ T6574] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a2b1cd6d4 [ 999.033289][ T6574] R13: 00000000004caa88 R14: 00000000004e40f8 R15: 0000000000000006 08:39:24 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:24 executing program 3 (fault-call:6 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 999.143564][ T6588] FAULT_INJECTION: forcing a failure. [ 999.143564][ T6588] name failslab, interval 1, probability 0, space 0, times 0 [ 999.222210][ T6588] CPU: 1 PID: 6588 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 999.231123][ T6588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.241184][ T6588] Call Trace: [ 999.244557][ T6588] dump_stack+0x11d/0x181 [ 999.248953][ T6588] should_fail.cold+0xa/0x1a [ 999.253640][ T6588] __should_failslab+0xee/0x130 [ 999.258539][ T6588] should_failslab+0x9/0x14 [ 999.263108][ T6588] kmem_cache_alloc+0x29/0x5d0 [ 999.267888][ T6588] ? __rcu_read_unlock+0x66/0x3d0 [ 999.272972][ T6588] ? memcg_kmem_put_cache+0x7c/0xc0 [ 999.278188][ T6588] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 999.284115][ T6588] skb_clone+0xf9/0x290 [ 999.288284][ T6588] netlink_deliver_tap+0x428/0x4a0 [ 999.293454][ T6588] netlink_unicast+0x43a/0x4d0 [ 999.298307][ T6588] netlink_sendmsg+0x4d3/0x8b0 [ 999.303092][ T6588] ? netlink_unicast+0x4d0/0x4d0 [ 999.308042][ T6588] sock_sendmsg+0x9f/0xc0 [ 999.312395][ T6588] ____sys_sendmsg+0x49d/0x4d0 [ 999.317291][ T6588] ___sys_sendmsg+0xb5/0x100 [ 999.321978][ T6588] ? __fget+0xb8/0x1d0 [ 999.326107][ T6588] ? __fget_light+0xaf/0x190 [ 999.330719][ T6588] ? __fdget+0x2c/0x40 [ 999.334817][ T6588] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 999.341080][ T6588] __sys_sendmsg+0xa0/0x160 [ 999.345645][ T6588] __x64_sys_sendmsg+0x51/0x70 [ 999.350448][ T6588] do_syscall_64+0xcc/0x3a0 [ 999.355019][ T6588] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 999.360962][ T6588] RIP: 0033:0x45af49 [ 999.364927][ T6588] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 999.384636][ T6588] RSP: 002b:00007f3666a64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 999.393064][ T6588] RAX: ffffffffffffffda RBX: 00007f3666a64c90 RCX: 000000000045af49 [ 999.401140][ T6588] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 999.409126][ T6588] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 999.417121][ T6588] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3666a656d4 [ 999.425110][ T6588] R13: 00000000004caa88 R14: 00000000004e40f8 R15: 0000000000000006 [ 999.475686][ T8044] tipc: TX() has been purged, node left! [ 999.583448][ T6593] FAULT_INJECTION: forcing a failure. [ 999.583448][ T6593] name failslab, interval 1, probability 0, space 0, times 0 [ 999.606194][ T6593] CPU: 0 PID: 6593 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 999.614848][ T6593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.625024][ T6593] Call Trace: [ 999.628392][ T6593] dump_stack+0x11d/0x181 [ 999.632756][ T6593] should_fail.cold+0xa/0x1a [ 999.637369][ T6593] __should_failslab+0xee/0x130 [ 999.642358][ T6593] should_failslab+0x9/0x14 [ 999.646894][ T6593] kmem_cache_alloc_trace+0x2a/0x5d0 [ 999.652256][ T6593] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 999.658174][ T6593] ? __rtnl_newlink+0x1090/0x1090 [ 999.663219][ T6593] rtnl_newlink+0x45/0x90 [ 999.667700][ T6593] rtnetlink_rcv_msg+0x1d3/0x500 [ 999.672695][ T6593] ? __rcu_read_unlock+0x66/0x3d0 [ 999.677742][ T6593] netlink_rcv_skb+0xb0/0x260 [ 999.682552][ T6593] ? rtnl_calcit.isra.0+0x220/0x220 [ 999.687803][ T6593] rtnetlink_rcv+0x26/0x30 [ 999.692266][ T6593] netlink_unicast+0x3a6/0x4d0 [ 999.697056][ T6593] netlink_sendmsg+0x4d3/0x8b0 [ 999.701937][ T6593] ? netlink_unicast+0x4d0/0x4d0 [ 999.706894][ T6593] sock_sendmsg+0x9f/0xc0 [ 999.711303][ T6593] ____sys_sendmsg+0x49d/0x4d0 [ 999.716096][ T6593] ___sys_sendmsg+0xb5/0x100 [ 999.720780][ T6593] ? __fget+0xb8/0x1d0 [ 999.724881][ T6593] ? __fget_light+0xaf/0x190 [ 999.729670][ T6593] ? __fdget+0x2c/0x40 [ 999.733785][ T6593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 999.740047][ T6593] __sys_sendmsg+0xa0/0x160 [ 999.744623][ T6593] __x64_sys_sendmsg+0x51/0x70 [ 999.749483][ T6593] do_syscall_64+0xcc/0x3a0 [ 999.754083][ T6593] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 999.759986][ T6593] RIP: 0033:0x45af49 [ 999.763945][ T6593] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 999.783603][ T6593] RSP: 002b:00007f2a2b1abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 999.792117][ T6593] RAX: ffffffffffffffda RBX: 00007f2a2b1abc90 RCX: 000000000045af49 [ 999.800104][ T6593] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 999.808088][ T6593] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 999.816074][ T6593] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a2b1ac6d4 [ 999.824098][ T6593] R13: 00000000004caa88 R14: 00000000004e40f8 R15: 0000000000000006 [ 1000.007194][ T6588] batman_adv: batadv0: Adding interface: veth1_to_bridge [ 1000.016888][ T6588] batman_adv: batadv0: The MTU of interface veth1_to_bridge is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1000.046795][ T6588] batman_adv: batadv0: Interface activated: veth1_to_bridge 08:39:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:25 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:25 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:25 executing program 3 (fault-call:6 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a1000000ce3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r6, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000380)='cpuacct.stat\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r7, &(0x7f00000003c0)={0x28, 0x2, 0x0, {0x1, 0x3, 0x307a}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f00000000c0)=0x28, 0x4) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') r9 = socket$unix(0x1, 0x2, 0x0) r10 = socket$unix(0x1, 0x1, 0x0) r11 = dup2(r10, r9) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r16, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@setlink={0x20, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r16, 0xf0ffff}}, 0x20}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000480)={@rand_addr="5513f094f880b4d640b89591e7531c44", 0x24, r16}) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_team(r11, 0x8933, &(0x7f0000000a40)={'team0\x00', 0x0}) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000000b00)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, r8, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r17}]}, 0x24}, 0x1, 0x0, 0x0, 0x41000}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r18, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="28007c1d627aa700001000250800000000000000a46e907f7531eb4b9baced0419f8e76096c14baaf9c12b4b68b91001813d8b3f05dc849f548a73b9cb84cb4ea79fa8243eac9d6149db9fa502a4341a6a6b107d253851dadae6c3731757408314aa143b38c82d2eb6f2930d9b9ff44e374700b39ccf53c4124cb51176e5", @ANYRES32=r18, @ANYBLOB="000000000000000008000a0014000000"], 0x28}}, 0x0) 08:39:26 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1000.345630][ T6599] FAULT_INJECTION: forcing a failure. [ 1000.345630][ T6599] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.345894][ T6602] batman_adv: batadv0: Adding interface: veth0_to_bond [ 1000.366983][ T6599] CPU: 1 PID: 6599 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1000.375712][ T6599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.385780][ T6599] Call Trace: [ 1000.389138][ T6599] dump_stack+0x11d/0x181 [ 1000.393590][ T6599] should_fail.cold+0xa/0x1a [ 1000.395259][ T6602] batman_adv: batadv0: The MTU of interface veth0_to_bond is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1000.398216][ T6599] __should_failslab+0xee/0x130 [ 1000.398251][ T6599] should_failslab+0x9/0x14 [ 1000.434152][ T6599] kmem_cache_alloc_node+0x39/0x660 [ 1000.439379][ T6599] ? __alloc_skb+0x2ba/0x360 [ 1000.444043][ T6599] __alloc_skb+0x8e/0x360 [ 1000.448402][ T6599] netlink_ack+0x19d/0x680 [ 1000.452888][ T6599] netlink_rcv_skb+0x22a/0x260 [ 1000.457671][ T6599] ? rtnl_calcit.isra.0+0x220/0x220 [ 1000.462939][ T6599] rtnetlink_rcv+0x26/0x30 [ 1000.467503][ T6599] netlink_unicast+0x3a6/0x4d0 [ 1000.472293][ T6599] netlink_sendmsg+0x4d3/0x8b0 [ 1000.477291][ T6599] ? netlink_unicast+0x4d0/0x4d0 [ 1000.482452][ T6599] sock_sendmsg+0x9f/0xc0 [ 1000.486816][ T6599] ____sys_sendmsg+0x49d/0x4d0 [ 1000.489795][ T6602] batman_adv: batadv0: Interface activated: veth0_to_bond [ 1000.491681][ T6599] ___sys_sendmsg+0xb5/0x100 [ 1000.503347][ T6599] ? __fget+0xb8/0x1d0 [ 1000.507442][ T6599] ? __fget_light+0xaf/0x190 [ 1000.512067][ T6599] ? __fdget+0x2c/0x40 [ 1000.516270][ T6599] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1000.522539][ T6599] __sys_sendmsg+0xa0/0x160 [ 1000.527129][ T6599] __x64_sys_sendmsg+0x51/0x70 [ 1000.531925][ T6599] do_syscall_64+0xcc/0x3a0 [ 1000.536456][ T6599] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1000.542359][ T6599] RIP: 0033:0x45af49 [ 1000.546401][ T6599] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1000.566163][ T6599] RSP: 002b:00007f2a2b1ccc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1000.574619][ T6599] RAX: ffffffffffffffda RBX: 00007f2a2b1ccc90 RCX: 000000000045af49 [ 1000.582696][ T6599] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 08:39:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1000.590751][ T6599] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1000.598746][ T6599] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a2b1cd6d4 [ 1000.606908][ T6599] R13: 00000000004caa88 R14: 00000000004e40f8 R15: 0000000000000006 08:39:26 executing program 3 (fault-call:6 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1000.729092][ T6609] bond0: (slave bond_slave_1): Releasing backup interface [ 1000.895607][ T6609] batman_adv: batadv0: Adding interface: bond_slave_1 [ 1000.905317][ T6609] batman_adv: batadv0: The MTU of interface bond_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1000.934702][ T6609] batman_adv: batadv0: Not using interface bond_slave_1 (retrying later): interface not active [ 1001.016809][ T6614] FAULT_INJECTION: forcing a failure. [ 1001.016809][ T6614] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.031211][ T6614] CPU: 1 PID: 6614 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1001.039819][ T6614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.049896][ T6614] Call Trace: [ 1001.053206][ T6614] dump_stack+0x11d/0x181 [ 1001.057563][ T6614] should_fail.cold+0xa/0x1a [ 1001.062174][ T6614] __should_failslab+0xee/0x130 [ 1001.067048][ T6614] should_failslab+0x9/0x14 [ 1001.071632][ T6614] kmem_cache_alloc_node_trace+0x3b/0x670 [ 1001.077381][ T6614] ? memcg_kmem_put_cache+0x7c/0xc0 [ 1001.082764][ T6614] __kmalloc_node_track_caller+0x38/0x50 [ 1001.088536][ T6614] __kmalloc_reserve.isra.0+0x49/0xd0 [ 1001.094057][ T6614] __alloc_skb+0xc2/0x360 [ 1001.098474][ T6614] netlink_ack+0x19d/0x680 [ 1001.102960][ T6614] netlink_rcv_skb+0x22a/0x260 [ 1001.107745][ T6614] ? rtnl_calcit.isra.0+0x220/0x220 [ 1001.112975][ T6614] rtnetlink_rcv+0x26/0x30 [ 1001.117476][ T6614] netlink_unicast+0x3a6/0x4d0 [ 1001.122268][ T6614] netlink_sendmsg+0x4d3/0x8b0 [ 1001.127107][ T6614] ? netlink_unicast+0x4d0/0x4d0 [ 1001.132065][ T6614] sock_sendmsg+0x9f/0xc0 [ 1001.136409][ T6614] ____sys_sendmsg+0x49d/0x4d0 [ 1001.141188][ T6614] ___sys_sendmsg+0xb5/0x100 [ 1001.145935][ T6614] ? __fget+0xb8/0x1d0 [ 1001.150028][ T6614] ? __fget_light+0xaf/0x190 [ 1001.154663][ T6614] ? __fdget+0x2c/0x40 [ 1001.158808][ T6614] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1001.165170][ T6614] __sys_sendmsg+0xa0/0x160 [ 1001.169816][ T6614] __x64_sys_sendmsg+0x51/0x70 [ 1001.174602][ T6614] do_syscall_64+0xcc/0x3a0 [ 1001.179130][ T6614] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1001.185136][ T6614] RIP: 0033:0x45af49 [ 1001.189144][ T6614] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1001.208863][ T6614] RSP: 002b:00007f2a2b1abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1001.217319][ T6614] RAX: ffffffffffffffda RBX: 00007f2a2b1abc90 RCX: 000000000045af49 [ 1001.225584][ T6614] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 1001.233564][ T6614] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1001.241573][ T6614] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a2b1ac6d4 [ 1001.249561][ T6614] R13: 00000000004caa88 R14: 00000000004e40f8 R15: 0000000000000006 [ 1001.380809][ T6620] IPVS: ftp: loaded support on port[0] = 21 [ 1001.627282][ T6620] chnl_net:caif_netlink_parms(): no params data found [ 1001.697483][ T6620] bridge0: port 1(bridge_slave_0) entered blocking state [ 1001.704846][ T6620] bridge0: port 1(bridge_slave_0) entered disabled state [ 1001.712982][ T6620] device bridge_slave_0 entered promiscuous mode [ 1001.750998][ T6620] bridge0: port 2(bridge_slave_1) entered blocking state [ 1001.758192][ T6620] bridge0: port 2(bridge_slave_1) entered disabled state [ 1001.766362][ T6620] device bridge_slave_1 entered promiscuous mode [ 1001.786759][ T6620] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1001.798684][ T8044] device bridge_slave_1 left promiscuous mode [ 1001.805269][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1001.842916][ T8044] device bridge_slave_0 left promiscuous mode [ 1001.849140][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1001.905294][ T8044] device veth1_vlan left promiscuous mode [ 1001.911136][ T8044] device veth0_vlan left promiscuous mode [ 1002.962581][ T8044] device hsr_slave_0 left promiscuous mode [ 1003.002150][ T8044] device hsr_slave_1 left promiscuous mode [ 1003.050044][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1003.060027][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1003.070772][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1003.126287][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1003.194897][ T8044] bond0 (unregistering): Released all slaves [ 1003.305763][ T6620] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1003.321038][ T6624] IPVS: ftp: loaded support on port[0] = 21 [ 1003.324781][ T6626] IPVS: ftp: loaded support on port[0] = 21 [ 1003.345680][ T6620] team0: Port device team_slave_0 added [ 1003.361773][ T6620] team0: Port device team_slave_1 added [ 1003.444397][ T6620] device hsr_slave_0 entered promiscuous mode [ 1003.492538][ T6620] device hsr_slave_1 entered promiscuous mode [ 1003.532160][ T6620] debugfs: Directory 'hsr0' with parent '/' already present! [ 1003.635032][ T6626] chnl_net:caif_netlink_parms(): no params data found [ 1003.690035][ T6626] bridge0: port 1(bridge_slave_0) entered blocking state [ 1003.712122][ T6626] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.720156][ T6626] device bridge_slave_0 entered promiscuous mode [ 1003.755827][ T6626] bridge0: port 2(bridge_slave_1) entered blocking state [ 1003.764031][ T6626] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.772500][ T6626] device bridge_slave_1 entered promiscuous mode [ 1003.801448][ T6624] chnl_net:caif_netlink_parms(): no params data found [ 1003.850940][ T6626] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1003.866652][ T6620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1003.887782][ T6626] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1003.931255][ T6624] bridge0: port 1(bridge_slave_0) entered blocking state [ 1003.938596][ T6624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.950275][ T6624] device bridge_slave_0 entered promiscuous mode [ 1003.958610][ T6626] team0: Port device team_slave_0 added [ 1003.973565][ T6626] team0: Port device team_slave_1 added [ 1003.984307][ T6620] 8021q: adding VLAN 0 to HW filter on device team0 [ 1003.992548][ T6624] bridge0: port 2(bridge_slave_1) entered blocking state [ 1003.999653][ T6624] bridge0: port 2(bridge_slave_1) entered disabled state [ 1004.012844][ T6624] device bridge_slave_1 entered promiscuous mode [ 1004.026860][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1004.038408][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1004.124362][ T6626] device hsr_slave_0 entered promiscuous mode [ 1004.162424][ T6626] device hsr_slave_1 entered promiscuous mode [ 1004.202189][ T6626] debugfs: Directory 'hsr0' with parent '/' already present! [ 1004.214345][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1004.223012][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1004.231295][ T8004] bridge0: port 1(bridge_slave_0) entered blocking state [ 1004.238398][ T8004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1004.246492][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1004.274244][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1004.283507][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1004.291926][ T5781] bridge0: port 2(bridge_slave_1) entered blocking state [ 1004.298988][ T5781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1004.307500][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1004.316594][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1004.325594][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1004.334603][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1004.343327][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1004.365308][ T6624] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1004.375714][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1004.384162][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1004.394099][ T6620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1004.408190][ T6624] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1004.428260][ T6624] team0: Port device team_slave_0 added [ 1004.448809][ T6620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1004.483524][ T6624] team0: Port device team_slave_1 added [ 1004.490559][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1004.498413][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1004.574737][ T6624] device hsr_slave_0 entered promiscuous mode [ 1004.622585][ T6624] device hsr_slave_1 entered promiscuous mode [ 1004.662146][ T6624] debugfs: Directory 'hsr0' with parent '/' already present! [ 1004.687684][ T6626] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1004.707072][ T6626] 8021q: adding VLAN 0 to HW filter on device team0 [ 1004.716592][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1004.727950][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1004.752172][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1004.760811][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1004.782464][ T6071] bridge0: port 1(bridge_slave_0) entered blocking state [ 1004.789761][ T6071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1004.810629][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1004.818683][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1004.827718][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1004.836697][ T8004] bridge0: port 2(bridge_slave_1) entered blocking state [ 1004.843783][ T8004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1004.851701][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1004.870492][ T6626] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1004.881059][ T6626] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1004.902381][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1004.911479][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1004.920593][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1004.929706][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1004.938438][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1004.947292][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1004.955873][ T8044] tipc: TX() has been purged, node left! [ 1004.955916][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1004.969809][ T8044] tipc: TX() has been purged, node left! [ 1004.970578][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1004.984505][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1004.994504][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1005.003123][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1005.010970][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1005.019771][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1005.048719][ T6624] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1005.159601][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1005.167169][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1005.179379][ T6626] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1005.190189][ T6620] device veth0_vlan entered promiscuous mode [ 1005.198871][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1005.207728][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1005.217125][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1005.225678][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1005.234298][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1005.242689][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1005.253201][ T6624] 8021q: adding VLAN 0 to HW filter on device team0 [ 1005.267472][ T6620] device veth1_vlan entered promiscuous mode [ 1005.275712][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1005.284276][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1005.293483][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1005.301942][ T5781] bridge0: port 1(bridge_slave_0) entered blocking state [ 1005.309004][ T5781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1005.377687][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1005.386400][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1005.409027][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1005.417923][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1005.427015][ T7993] bridge0: port 2(bridge_slave_1) entered blocking state [ 1005.434081][ T7993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1005.442151][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1005.451250][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1005.460681][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1005.469568][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1005.478241][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1005.487068][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1005.495745][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1005.504295][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1005.578345][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1005.588800][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1005.597594][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1005.606829][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1005.615936][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1005.633144][ T6624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1005.649228][ T6626] device veth0_vlan entered promiscuous mode [ 1005.719046][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1005.731086][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1005.740326][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1005.748319][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 08:39:31 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a1000000ee3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:31 executing program 3 (fault-call:6 fault-nth:6): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1005.772231][ T6624] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1005.779853][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1005.788100][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1005.809383][ T6626] device veth1_vlan entered promiscuous mode [ 1005.963768][ T6652] team0: Port device team_slave_1 removed [ 1005.969841][ T6652] batman_adv: batadv0: Adding interface: team_slave_1 [ 1005.976971][ T6652] batman_adv: batadv0: The MTU of interface team_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1006.006349][ T6652] batman_adv: batadv0: Not using interface team_slave_1 (retrying later): interface not active [ 1006.017604][ T6654] FAULT_INJECTION: forcing a failure. [ 1006.017604][ T6654] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.031014][ T6654] CPU: 1 PID: 6654 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1006.039672][ T6654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.050025][ T6654] Call Trace: [ 1006.053317][ T6654] dump_stack+0x11d/0x181 [ 1006.057718][ T6654] should_fail.cold+0xa/0x1a [ 1006.062346][ T6654] __should_failslab+0xee/0x130 [ 1006.067196][ T6654] should_failslab+0x9/0x14 [ 1006.071701][ T6654] kmem_cache_alloc+0x29/0x5d0 [ 1006.076456][ T6654] ? kstrdup+0x68/0x80 [ 1006.080576][ T6654] __kernfs_new_node+0x8d/0x400 [ 1006.085433][ T6654] ? string_nocheck+0xe8/0x100 [ 1006.090263][ T6654] kernfs_new_node+0x79/0xd0 [ 1006.094841][ T6654] kernfs_create_link+0x81/0x150 [ 1006.099808][ T6654] sysfs_do_create_link_sd.isra.0+0x86/0x130 [ 1006.105776][ T6654] sysfs_create_link+0x5c/0xa0 [ 1006.110526][ T6654] netdev_adjacent_sysfs_add+0x7b/0xb0 [ 1006.116098][ T6654] __netdev_adjacent_dev_insert+0x36f/0x430 [ 1006.121976][ T6654] __netdev_upper_dev_link+0x2e7/0x6f0 [ 1006.127451][ T6654] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1006.133391][ T6654] netdev_master_upper_dev_link+0x43/0x60 [ 1006.139123][ T6654] batadv_hardif_enable_interface+0x1f4/0x730 [ 1006.145241][ T6654] batadv_softif_slave_add+0x72/0x120 [ 1006.150594][ T6654] ? batadv_softif_slave_del+0x100/0x100 [ 1006.156209][ T6654] do_set_master+0x161/0x180 [ 1006.160787][ T6654] do_setlink+0x697/0x1ee0 [ 1006.165286][ T6654] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1006.171164][ T6654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1006.177432][ T6654] ? __nla_validate_parse+0xa0/0x1140 [ 1006.182802][ T6654] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1006.188793][ T6654] ? __read_once_size+0x68/0x120 [ 1006.193739][ T6654] __rtnl_newlink+0x950/0x1090 [ 1006.198617][ T6654] ? cgroup_rstat_updated+0xbe/0x1e0 [ 1006.203970][ T6654] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1006.209684][ T6654] ? __rcu_read_unlock+0x66/0x3d0 [ 1006.214706][ T6654] ? __update_load_avg_cfs_rq+0x1e8/0x2d0 [ 1006.220420][ T6654] ? update_load_avg+0x7b/0x5d0 [ 1006.225302][ T6654] ? __list_del_entry_valid+0x86/0x93 [ 1006.230723][ T6654] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1006.236602][ T6654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1006.242908][ T6654] ? kmem_cache_alloc_trace+0x1b0/0x5d0 [ 1006.248452][ T6654] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1006.254330][ T6654] ? __rtnl_newlink+0x1090/0x1090 [ 1006.259356][ T6654] rtnl_newlink+0x63/0x90 [ 1006.263730][ T6654] rtnetlink_rcv_msg+0x1d3/0x500 [ 1006.268680][ T6654] ? __rcu_read_unlock+0x66/0x3d0 [ 1006.273786][ T6654] netlink_rcv_skb+0xb0/0x260 [ 1006.278458][ T6654] ? rtnl_calcit.isra.0+0x220/0x220 [ 1006.283716][ T6654] rtnetlink_rcv+0x26/0x30 [ 1006.288139][ T6654] netlink_unicast+0x3a6/0x4d0 [ 1006.293023][ T6654] netlink_sendmsg+0x4d3/0x8b0 [ 1006.297792][ T6654] ? netlink_unicast+0x4d0/0x4d0 [ 1006.302730][ T6654] sock_sendmsg+0x9f/0xc0 [ 1006.307055][ T6654] ____sys_sendmsg+0x49d/0x4d0 [ 1006.311809][ T6654] ___sys_sendmsg+0xb5/0x100 [ 1006.316453][ T6654] ? __fget+0xb8/0x1d0 [ 1006.320527][ T6654] ? __fget_light+0xaf/0x190 [ 1006.325113][ T6654] ? __fdget+0x2c/0x40 [ 1006.329247][ T6654] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1006.335476][ T6654] __sys_sendmsg+0xa0/0x160 [ 1006.339976][ T6654] __x64_sys_sendmsg+0x51/0x70 [ 1006.344782][ T6654] do_syscall_64+0xcc/0x3a0 [ 1006.349280][ T6654] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.355180][ T6654] RIP: 0033:0x45af49 [ 1006.359080][ T6654] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1006.378674][ T6654] RSP: 002b:00007f2a2b1abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1006.387143][ T6654] RAX: ffffffffffffffda RBX: 00007f2a2b1abc90 RCX: 000000000045af49 [ 1006.395167][ T6654] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 1006.403134][ T6654] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1006.411179][ T6654] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a2b1ac6d4 [ 1006.419153][ T6654] R13: 00000000004caa88 R14: 00000000004e40f8 R15: 0000000000000006 [ 1006.442618][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1006.450613][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 08:39:32 executing program 3 (fault-call:6 fault-nth:7): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:32 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1006.654073][ T6663] device bridge_slave_0 left promiscuous mode [ 1006.660511][ T6663] bridge0: port 1(bridge_slave_0) entered disabled state [ 1006.667636][ T6663] FAULT_INJECTION: forcing a failure. [ 1006.667636][ T6663] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.680259][ T6663] CPU: 0 PID: 6663 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1006.688834][ T6663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.698912][ T6663] Call Trace: [ 1006.702210][ T6663] dump_stack+0x11d/0x181 [ 1006.706545][ T6663] should_fail.cold+0xa/0x1a [ 1006.711172][ T6663] __should_failslab+0xee/0x130 [ 1006.716016][ T6663] should_failslab+0x9/0x14 [ 1006.720512][ T6663] kmem_cache_alloc_node+0x39/0x660 [ 1006.725843][ T6663] ? vprintk_func+0x92/0x140 [ 1006.730436][ T6663] __alloc_skb+0x8e/0x360 [ 1006.734760][ T6663] br_ifinfo_notify+0x83/0x180 [ 1006.739515][ T6663] br_stp_disable_port+0x9e/0x190 [ 1006.744622][ T6663] del_nbp+0xe0/0x5f0 [ 1006.748591][ T6663] br_del_if+0xa3/0x200 [ 1006.752742][ T6663] br_del_slave+0x2a/0x40 [ 1006.757094][ T6663] ? br_fix_features+0x40/0x40 [ 1006.761993][ T6663] do_set_master+0xa8/0x180 [ 1006.766530][ T6663] do_setlink+0x697/0x1ee0 [ 1006.771060][ T6663] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1006.780286][ T6663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1006.786584][ T6663] ? __nla_validate_parse+0xa0/0x1140 [ 1006.791949][ T6663] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1006.797835][ T6663] ? __read_once_size+0x68/0x120 [ 1006.802896][ T6663] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1006.809157][ T6663] __rtnl_newlink+0x950/0x1090 [ 1006.813921][ T6663] ? _raw_spin_unlock_irq+0x68/0x80 [ 1006.819230][ T6663] ? __schedule+0x30e/0x690 [ 1006.823784][ T6663] ? cgroup_rstat_updated+0xbe/0x1e0 [ 1006.829200][ T6663] ? __rcu_read_unlock+0x66/0x3d0 [ 1006.834241][ T6663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1006.840471][ T6663] ? update_load_avg+0x7b/0x5d0 [ 1006.845335][ T6663] ? __list_del_entry_valid+0x86/0x93 [ 1006.850711][ T6663] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1006.856650][ T6663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1006.862986][ T6663] ? kmem_cache_alloc_trace+0x1b0/0x5d0 [ 1006.868531][ T6663] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1006.874415][ T6663] ? __rtnl_newlink+0x1090/0x1090 [ 1006.879451][ T6663] rtnl_newlink+0x63/0x90 [ 1006.883838][ T6663] rtnetlink_rcv_msg+0x1d3/0x500 [ 1006.888764][ T6663] ? __rcu_read_unlock+0x66/0x3d0 [ 1006.893835][ T6663] netlink_rcv_skb+0xb0/0x260 [ 1006.898499][ T6663] ? rtnl_calcit.isra.0+0x220/0x220 [ 1006.903687][ T6663] rtnetlink_rcv+0x26/0x30 [ 1006.908132][ T6663] netlink_unicast+0x3a6/0x4d0 [ 1006.912889][ T6663] netlink_sendmsg+0x4d3/0x8b0 [ 1006.917655][ T6663] ? netlink_unicast+0x4d0/0x4d0 [ 1006.922577][ T6663] sock_sendmsg+0x9f/0xc0 [ 1006.926928][ T6663] ____sys_sendmsg+0x49d/0x4d0 [ 1006.931703][ T6663] ___sys_sendmsg+0xb5/0x100 [ 1006.936314][ T6663] ? __fget+0xb8/0x1d0 [ 1006.940386][ T6663] ? __fget_light+0xaf/0x190 [ 1006.944995][ T6663] ? __fdget+0x2c/0x40 [ 1006.949096][ T6663] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1006.955363][ T6663] __sys_sendmsg+0xa0/0x160 [ 1006.959934][ T6663] __x64_sys_sendmsg+0x51/0x70 [ 1006.964692][ T6663] do_syscall_64+0xcc/0x3a0 [ 1006.969186][ T6663] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.975142][ T6663] RIP: 0033:0x45af49 [ 1006.979038][ T6663] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1006.998630][ T6663] RSP: 002b:00007f2a2b1abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1007.007208][ T6663] RAX: ffffffffffffffda RBX: 00007f2a2b1abc90 RCX: 000000000045af49 [ 1007.015226][ T6663] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 1007.023226][ T6663] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1007.031317][ T6663] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a2b1ac6d4 [ 1007.039281][ T6663] R13: 00000000004caa88 R14: 00000000004e40f8 R15: 0000000000000006 08:39:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a1000000fe3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1007.202877][ T6663] batman_adv: batadv0: Adding interface: bridge_slave_0 [ 1007.226945][ T6663] batman_adv: batadv0: The MTU of interface bridge_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1007.302155][ T6663] batman_adv: batadv0: Interface activated: bridge_slave_0 [ 1007.321135][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1007.331862][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1007.379846][ T6624] device veth0_vlan entered promiscuous mode [ 1007.475590][ T6679] batman_adv: batadv0: Adding interface: veth1_to_hsr [ 1007.482553][ T6679] batman_adv: batadv0: The MTU of interface veth1_to_hsr is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1007.509013][ T6679] batman_adv: batadv0: Interface activated: veth1_to_hsr [ 1007.522313][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1007.530527][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1007.540065][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1007.548621][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1007.674298][ T6624] device veth1_vlan entered promiscuous mode 08:39:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$unix(0x1, 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) dup2(r5, r4) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x22b, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESDEC, @ANYRESHEX=r4, @ANYRESOCT], @ANYRESDEC=r1, @ANYRESOCT=r7, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRES16=r3, @ANYBLOB="dc6b0e244f2b55f9a99d076fa1fc03329164ad78623abce5ce866ff8c8e138c917322a8acf31fd8eaa052f5578d2623f4de05b73d1bfb960b07b2991a89162ce101b606b8d4d5dbca63f265036b5f5a3bf24230d66295eddf91c884a134bc205e45d506b1aebe7b3a2d481b58c287cf026d97ec4cd6910e88cbdd50f3bb7d7d418a723c9e61dd680dd68ade9668727d7508ce8dffbaab83f25302cd729172d68e233a4fe770c273b4394a9668c4ee2b7160d0ccc7574334c5813e55d64123068e25e8fee5e7f49d5455b52be", @ANYPTR64, @ANYBLOB="9b17ad020343e161e2cde17e88d666307c9c5d670da24924051656e4ab81a7ba82069f6a094f27e3a43d12ce881127b3453f7becb140b93d274cf7804cad718150af71bebf6567451a1fcb9e98d1f803da252eaf3b4d0cf1f74e218c7c3990de51c6727484c85af90cdc0d2e65d7d8cfd5af7a9a1de6c971948d62f98c8a3c454c90aa3d9541af1bd1734e784e4eeed733", @ANYRES16, @ANYPTR64, @ANYRESHEX, @ANYBLOB="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", @ANYRES16=r1]], @ANYRES32=0x0, @ANYBLOB="000000793b4a3f658f5055b9b7915fd038ccc152bf30427d7555a3ac641b7200cf3c6509d898d83c958d5fd8648abf7f6302146a78bb11fae3d42e3ac8676435c73320ca8778d4af1ba6127f631fbf5b348a8be99b5d1a1816b8c05f04cf5c2ca7067f8ccd5b31fb30be1deef8d9ceff7242fadda4002663473190c4c8f91d43398e454d5e53e92f1cf6403bd01444865e682ea11240a640241bfbf10bded2", @ANYRES32], 0x6}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:33 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:33 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:33 executing program 3 (fault-call:6 fault-nth:8): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000010e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1007.824568][ T8044] device bridge_slave_1 left promiscuous mode [ 1007.830788][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.882903][ T8044] device bridge_slave_0 left promiscuous mode [ 1007.889129][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.985125][ T8044] device bridge_slave_1 left promiscuous mode [ 1007.991393][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1008.062751][ T8044] device bridge_slave_0 left promiscuous mode [ 1008.069213][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state 08:39:33 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1008.138058][ T8044] device veth1_vlan left promiscuous mode [ 1008.165282][ T8044] device veth0_vlan left promiscuous mode [ 1008.192222][ T8044] device veth1_vlan left promiscuous mode [ 1008.198005][ T8044] device veth0_vlan left promiscuous mode 08:39:34 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:34 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1010.492332][ T8044] device hsr_slave_0 left promiscuous mode [ 1010.532182][ T8044] device hsr_slave_1 left promiscuous mode [ 1010.578209][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1010.588773][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1010.600365][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1010.656554][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1010.758314][ T8044] bond0 (unregistering): Released all slaves [ 1010.932442][ T8044] device hsr_slave_0 left promiscuous mode [ 1010.972177][ T8044] device hsr_slave_1 left promiscuous mode [ 1011.019810][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1011.031298][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1011.042257][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1011.076400][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1011.136610][ T8044] bond0 (unregistering): Released all slaves [ 1011.238982][ T6707] batman_adv: batadv0: Adding interface: veth1_virt_wifi [ 1011.246298][ T6707] batman_adv: batadv0: The MTU of interface veth1_virt_wifi is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1011.272844][ T6707] batman_adv: batadv0: Interface activated: veth1_virt_wifi [ 1011.280691][ T6708] FAULT_INJECTION: forcing a failure. [ 1011.280691][ T6708] name failslab, interval 1, probability 0, space 0, times 0 [ 1011.297705][ T6708] CPU: 0 PID: 6708 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1011.306461][ T6708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.316575][ T6708] Call Trace: [ 1011.319943][ T6708] dump_stack+0x11d/0x181 [ 1011.324319][ T6708] should_fail.cold+0xa/0x1a [ 1011.328916][ T6708] __should_failslab+0xee/0x130 [ 1011.333799][ T6708] should_failslab+0x9/0x14 [ 1011.338317][ T6708] kmem_cache_alloc_trace+0x2a/0x5d0 [ 1011.343591][ T6708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1011.349837][ T6708] ? sysfs_do_create_link_sd.isra.0+0xb6/0x130 [ 1011.355989][ T6708] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1011.361880][ T6708] __netdev_adjacent_dev_insert+0x110/0x430 [ 1011.367791][ T6708] __netdev_upper_dev_link+0x31d/0x6f0 [ 1011.373267][ T6708] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1011.379189][ T6708] netdev_master_upper_dev_link+0x43/0x60 [ 1011.384902][ T6708] batadv_hardif_enable_interface+0x1f4/0x730 [ 1011.390987][ T6708] batadv_softif_slave_add+0x72/0x120 [ 1011.396495][ T6708] ? batadv_softif_slave_del+0x100/0x100 [ 1011.402116][ T6708] do_set_master+0x161/0x180 [ 1011.406788][ T6708] do_setlink+0x697/0x1ee0 [ 1011.411193][ T6708] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1011.417075][ T6708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1011.423303][ T6708] ? __nla_validate_parse+0xa0/0x1140 [ 1011.428718][ T6708] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1011.434610][ T6708] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1011.440520][ T6708] ? __read_once_size+0x68/0x120 [ 1011.445444][ T6708] __rtnl_newlink+0x950/0x1090 [ 1011.450235][ T6708] ? preempt_schedule_irq+0x72/0x90 [ 1011.455429][ T6708] ? cgroup_rstat_updated+0xbe/0x1e0 [ 1011.460733][ T6708] ? __rcu_read_unlock+0x66/0x3d0 [ 1011.465753][ T6708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1011.471977][ T6708] ? update_load_avg+0x7b/0x5d0 [ 1011.476899][ T6708] ? __list_del_entry_valid+0x86/0x93 [ 1011.482285][ T6708] ? update_curr+0x65/0x1d0 [ 1011.486785][ T6708] ? __update_load_avg_se+0x20a/0x2f0 [ 1011.492205][ T6708] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1011.498158][ T6708] ? kmem_cache_alloc_trace+0x1b0/0x5d0 [ 1011.503707][ T6708] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1011.509630][ T6708] ? __rtnl_newlink+0x1090/0x1090 [ 1011.514652][ T6708] rtnl_newlink+0x63/0x90 [ 1011.518980][ T6708] rtnetlink_rcv_msg+0x1d3/0x500 [ 1011.523975][ T6708] ? __rcu_read_unlock+0x66/0x3d0 [ 1011.529062][ T6708] netlink_rcv_skb+0xb0/0x260 [ 1011.533743][ T6708] ? rtnl_calcit.isra.0+0x220/0x220 [ 1011.538945][ T6708] rtnetlink_rcv+0x26/0x30 [ 1011.543537][ T6708] netlink_unicast+0x3a6/0x4d0 [ 1011.548310][ T6708] netlink_sendmsg+0x4d3/0x8b0 [ 1011.553082][ T6708] ? netlink_unicast+0x4d0/0x4d0 [ 1011.558070][ T6708] sock_sendmsg+0x9f/0xc0 [ 1011.562387][ T6708] ____sys_sendmsg+0x49d/0x4d0 [ 1011.567253][ T6708] ___sys_sendmsg+0xb5/0x100 [ 1011.571830][ T6708] ? __fget+0xb8/0x1d0 [ 1011.575892][ T6708] ? __fget_light+0xaf/0x190 [ 1011.580498][ T6708] ? __fdget+0x2c/0x40 [ 1011.584566][ T6708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1011.590826][ T6708] __sys_sendmsg+0xa0/0x160 [ 1011.595388][ T6708] __x64_sys_sendmsg+0x51/0x70 [ 1011.600145][ T6708] do_syscall_64+0xcc/0x3a0 [ 1011.604644][ T6708] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1011.610535][ T6708] RIP: 0033:0x45af49 [ 1011.614445][ T6708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:39:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x4) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="280010001000250800000000000000000e5e773270b7d200000000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014000000"], 0x28}}, 0x0) [ 1011.634057][ T6708] RSP: 002b:00007f2a2b1abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1011.642476][ T6708] RAX: ffffffffffffffda RBX: 00007f2a2b1abc90 RCX: 000000000045af49 [ 1011.650512][ T6708] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 1011.658502][ T6708] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1011.666467][ T6708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2a2b1ac6d4 [ 1011.674488][ T6708] R13: 00000000004caa88 R14: 00000000004e40f8 R15: 0000000000000006 08:39:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000044e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = accept4(r1, &(0x7f00000002c0)=@nfc, &(0x7f0000000140)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000240)={0x4, [0x7ff, 0x1, 0x200, 0x800]}, &(0x7f0000000340)=0xc) r3 = socket(0x10, 0x803, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000003c0)={'ipvlan0\x00', {0x2, 0x4e22, @local}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$ax25_SO_BINDTODEVICE(r6, 0x101, 0x19, &(0x7f0000000380)=@bpq0='bpq0\x00', 0x10) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) mlockall(0x7) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r8, r9, 0x0, 0x320c) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="48000000100005070000000000000000009d0000690596dd58f5008a4ba8ad44131dcc2f79b40a6ebbf2cdeef6c438a3e9f1f3e35a6977520873f94e4bae9dc83f9710e7963dc141a880f19cde1b0e56fe194941a1f7aa793ee6ce7a08ff4e786288b7c234ee1c717b46d1db979fb6afa7b4ad6055761f8db310e952a3703b55935fe197bb55507339a990013811596300401c4285c0505c45e1772214a9899a63af11cc40833324b02e8177d56805281e9fc989ca5147e44dfc0c7306515c36e3db20c312ad2695465998c46db2fe8eff6c3f847defc7b16678ecbf0224baaf085b85c99084e12468ecd08dc1807041506c8eb4b8b4ac5cc6d352b2c744fbc564aaae9e6ce006c8c0", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="0200000000000000"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1011.888563][ T6729] IPVS: ftp: loaded support on port[0] = 21 [ 1011.905096][ T6739] bond0: (slave bond_slave_1): Releasing backup interface [ 1012.016190][ T6739] batman_adv: batadv0: Adding interface: bond_slave_1 [ 1012.023513][ T6739] batman_adv: batadv0: The MTU of interface bond_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1012.049787][ T6739] batman_adv: batadv0: Not using interface bond_slave_1 (retrying later): interface not active [ 1012.087353][ T6748] batman_adv: batadv0: Adding interface: vlan0 [ 1012.100350][ T6748] batman_adv: batadv0: The MTU of interface vlan0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1012.155533][ T6748] batman_adv: batadv0: Interface activated: vlan0 [ 1012.189864][ T6747] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1012.272806][ T6749] batman_adv: batadv0: Adding interface: bond0 [ 1012.279063][ T6749] batman_adv: batadv0: The MTU of interface bond0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1012.305387][ T6749] batman_adv: batadv0: Interface activated: bond0 [ 1012.393649][ T6749] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1012.422282][ T6729] chnl_net:caif_netlink_parms(): no params data found [ 1012.534062][ T6729] bridge0: port 1(bridge_slave_0) entered blocking state [ 1012.541313][ T6729] bridge0: port 1(bridge_slave_0) entered disabled state [ 1012.549599][ T6729] device bridge_slave_0 entered promiscuous mode [ 1012.558161][ T6729] bridge0: port 2(bridge_slave_1) entered blocking state [ 1012.565884][ T6729] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.574054][ T6729] device bridge_slave_1 entered promiscuous mode [ 1012.593866][ T6729] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1012.604828][ T6729] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1012.625493][ T6729] team0: Port device team_slave_0 added [ 1012.632791][ T6729] team0: Port device team_slave_1 added [ 1012.698070][ T6729] device hsr_slave_0 entered promiscuous mode [ 1012.752438][ T6729] device hsr_slave_1 entered promiscuous mode [ 1012.795085][ T6729] debugfs: Directory 'hsr0' with parent '/' already present! [ 1012.867801][ T6729] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1012.879986][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1012.889446][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1012.899309][ T6729] 8021q: adding VLAN 0 to HW filter on device team0 [ 1012.909503][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1012.918479][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1012.926952][ T6071] bridge0: port 1(bridge_slave_0) entered blocking state [ 1012.934149][ T6071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1012.953775][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1012.961820][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1012.970873][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1012.979764][ T6050] bridge0: port 2(bridge_slave_1) entered blocking state [ 1012.986954][ T6050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1012.995750][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1013.004720][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1013.013864][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1013.022587][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1013.031451][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1013.040639][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1013.054934][ T6729] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1013.065566][ T6729] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1013.077452][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1013.086010][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1013.094581][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1013.103811][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1013.112194][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1013.120811][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1013.138294][ T6729] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1013.145989][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1013.154248][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1013.213921][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1013.227595][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1013.237957][ T6729] device veth0_vlan entered promiscuous mode [ 1013.244990][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1013.252786][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1013.265733][ T6729] device veth1_vlan entered promiscuous mode 08:39:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:39 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:39 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000046e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$unix(0x1, 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@setlink={0x20, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r11, 0xf0ffff}}, 0x20}}, 0x0) setsockopt$inet6_mreq(r6, 0x29, 0x3d, &(0x7f00000000c0)={@mcast1, r11}, 0x14) r12 = socket$unix(0x1, 0x2, 0x0) r13 = socket$unix(0x1, 0x1, 0x0) r14 = dup2(r13, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_ASSOCINFO(r14, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x9, 0x3f, 0x4, 0x8, 0x1}, 0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x825, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, 0x0, 0x1901}, [@IFLA_PROTO_DOWN={0x5, 0xa, 0x14}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x8002}]}, 0x30}}, 0x0) [ 1013.442201][ T8044] tipc: TX() has been purged, node left! [ 1013.495574][ T8044] tipc: TX() has been purged, node left! 08:39:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000048e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1013.673021][ T6773] team0: Port device team_slave_0 removed [ 1013.718612][ T6773] batman_adv: batadv0: Adding interface: team_slave_0 [ 1013.742179][ T6773] batman_adv: batadv0: The MTU of interface team_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1013.817235][ T6773] batman_adv: batadv0: Not using interface team_slave_0 (retrying later): interface not active [ 1013.848434][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1013.862540][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1014.207855][ T6776] batman_adv: batadv0: Adding interface: macvlan1 [ 1014.215619][ T6776] batman_adv: batadv0: The MTU of interface macvlan1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1014.241483][ T6776] batman_adv: batadv0: Interface activated: macvlan1 08:39:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1014.315220][ T6785] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 08:39:40 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1014.456031][ T6792] batman_adv: batadv0: Adding interface: hsr_slave_0 [ 1014.466427][ T6792] batman_adv: batadv0: The MTU of interface hsr_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1014.497351][ T6792] batman_adv: batadv0: Interface activated: hsr_slave_0 08:39:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_buf(r5, 0x0, 0x20, &(0x7f0000000140)="5ada58c06e99e2f89166ffdedc", 0xd) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a1000004ae3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:40 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1014.799183][ T6805] batman_adv: batadv0: Adding interface: veth2 [ 1014.813315][ T6805] batman_adv: batadv0: The MTU of interface veth2 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1014.843225][ T6805] batman_adv: batadv0: Not using interface veth2 (retrying later): interface not active [ 1014.857863][ T6801] batman_adv: batadv0: Adding interface: veth1_to_bridge [ 1014.866008][ T6801] batman_adv: batadv0: The MTU of interface veth1_to_bridge is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1014.897739][ T6801] batman_adv: batadv0: Interface activated: veth1_to_bridge [ 1015.609528][ T6813] IPVS: ftp: loaded support on port[0] = 21 [ 1015.710706][ T6813] chnl_net:caif_netlink_parms(): no params data found [ 1015.784770][ T6813] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.791920][ T6813] bridge0: port 1(bridge_slave_0) entered disabled state [ 1015.799728][ T6813] device bridge_slave_0 entered promiscuous mode [ 1015.807246][ T6813] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.814330][ T6813] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.822014][ T6813] device bridge_slave_1 entered promiscuous mode [ 1015.836082][ T8044] device bridge_slave_1 left promiscuous mode [ 1015.842549][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.883007][ T8044] device bridge_slave_0 left promiscuous mode [ 1015.889336][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1015.944954][ T8044] device bridge_slave_1 left promiscuous mode [ 1015.951227][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1016.002754][ T8044] device bridge_slave_0 left promiscuous mode [ 1016.009028][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1016.077149][ T8044] device veth1_vlan left promiscuous mode [ 1016.083344][ T8044] device veth0_vlan left promiscuous mode [ 1016.089174][ T8044] device veth1_vlan left promiscuous mode [ 1016.095334][ T8044] device veth0_vlan left promiscuous mode [ 1017.782323][ T8044] device hsr_slave_0 left promiscuous mode [ 1017.822131][ T8044] device hsr_slave_1 left promiscuous mode [ 1017.868804][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1017.879382][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1017.889795][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1017.935366][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1018.014870][ T8044] bond0 (unregistering): Released all slaves [ 1018.242844][ T8044] device hsr_slave_0 left promiscuous mode [ 1018.292172][ T8044] device hsr_slave_1 left promiscuous mode [ 1018.349409][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1018.359843][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1018.370631][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1018.406621][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1018.474138][ T8044] bond0 (unregistering): Released all slaves [ 1018.594168][ T6813] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1018.594917][ T6816] IPVS: ftp: loaded support on port[0] = 21 [ 1018.605033][ T6813] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1018.631551][ T6813] team0: Port device team_slave_0 added [ 1018.638690][ T6813] team0: Port device team_slave_1 added [ 1018.704596][ T6813] device hsr_slave_0 entered promiscuous mode [ 1018.744019][ T6813] device hsr_slave_1 entered promiscuous mode [ 1018.822166][ T6813] debugfs: Directory 'hsr0' with parent '/' already present! [ 1018.892752][ T6816] chnl_net:caif_netlink_parms(): no params data found [ 1019.038269][ T6816] bridge0: port 1(bridge_slave_0) entered blocking state [ 1019.049203][ T6816] bridge0: port 1(bridge_slave_0) entered disabled state [ 1019.057271][ T6816] device bridge_slave_0 entered promiscuous mode [ 1019.070089][ T6813] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1019.078056][ T6816] bridge0: port 2(bridge_slave_1) entered blocking state [ 1019.085460][ T6816] bridge0: port 2(bridge_slave_1) entered disabled state [ 1019.093537][ T6816] device bridge_slave_1 entered promiscuous mode [ 1019.106708][ T6813] 8021q: adding VLAN 0 to HW filter on device team0 [ 1019.114359][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1019.128126][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1019.135828][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1019.168430][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1019.177776][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1019.186581][ T8004] bridge0: port 1(bridge_slave_0) entered blocking state [ 1019.193737][ T8004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1019.201947][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1019.210774][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1019.219831][ T8004] bridge0: port 2(bridge_slave_1) entered blocking state [ 1019.226918][ T8004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1019.235211][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1019.244474][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1019.254336][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1019.263611][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1019.274704][ T6816] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1019.289601][ T6813] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1019.300856][ T6813] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1019.313972][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1019.322726][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1019.331056][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1019.340358][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1019.350641][ T6816] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1019.369920][ T6813] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1019.378001][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1019.386512][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1019.394225][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1019.416996][ T6816] team0: Port device team_slave_0 added [ 1019.423745][ T6816] team0: Port device team_slave_1 added [ 1019.474716][ T6816] device hsr_slave_0 entered promiscuous mode [ 1019.512645][ T6816] device hsr_slave_1 entered promiscuous mode [ 1019.552273][ T6816] debugfs: Directory 'hsr0' with parent '/' already present! [ 1019.627708][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1019.637132][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1019.655084][ T6813] device veth0_vlan entered promiscuous mode [ 1019.661909][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1019.675652][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1019.688074][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1019.698596][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1019.724328][ T6813] device veth1_vlan entered promiscuous mode [ 1019.758904][ T6816] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1019.794904][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1019.810555][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1019.825558][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1019.834232][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1019.844491][ T6816] 8021q: adding VLAN 0 to HW filter on device team0 [ 1019.854790][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1019.863770][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1019.872578][ T5751] bridge0: port 1(bridge_slave_0) entered blocking state [ 1019.879698][ T5751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1019.893126][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:39:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000480)=""/165, &(0x7f0000000240)=0xa5) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@empty, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000140)=0xe8) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:45 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a1000004ce3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1019.915414][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1019.946457][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1019.977227][ T6071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1019.984345][ T6071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1019.994042][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1020.003432][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1020.012898][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1020.021881][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1020.031130][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1020.040554][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1020.050650][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1020.066390][ T6816] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1020.076880][ T6816] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1020.097701][ T6837] batman_adv: batadv0: Adding interface: hsr0 [ 1020.108339][ T6837] batman_adv: batadv0: The MTU of interface hsr0 is too small (1494) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1020.134340][ T6837] batman_adv: batadv0: Interface activated: hsr0 [ 1020.141935][ T6838] batman_adv: batadv0: Adding interface: veth5 [ 1020.148831][ T6838] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1020.174376][ T6838] batman_adv: batadv0: Not using interface veth5 (retrying later): interface not active [ 1020.250585][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1020.259553][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1020.268202][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1020.276763][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1020.285886][ T6839] batman_adv: batadv0: Adding interface: veth1_to_bond 08:39:46 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1020.293381][ T6839] batman_adv: batadv0: The MTU of interface veth1_to_bond is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1020.319715][ T6839] batman_adv: batadv0: Interface activated: veth1_to_bond [ 1020.342143][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:39:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1020.358222][ T6816] 8021q: adding VLAN 0 to HW filter on device batadv0 08:39:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000060e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1020.405222][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1020.413800][ T8044] tipc: TX() has been purged, node left! [ 1020.422756][ T8044] tipc: TX() has been purged, node left! [ 1020.427964][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 08:39:46 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1020.524403][ T6848] batman_adv: batadv0: Adding interface: virt_wifi0 [ 1020.567881][ T6848] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:39:46 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ptrace$peekuser(0x3, r0, 0x5) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r5, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000240), &(0x7f00000002c0)=0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) fremovexattr(r6, &(0x7f0000000300)=@known='trusted.overlay.origin\x00') [ 1020.643533][ T6848] batman_adv: batadv0: Not using interface virt_wifi0 (retrying later): interface not active [ 1021.004737][ T6858] batman_adv: batadv0: Adding interface: veth7 [ 1021.021088][ T6858] batman_adv: batadv0: The MTU of interface veth7 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1021.052996][ T6858] batman_adv: batadv0: Not using interface veth7 (retrying later): interface not active [ 1021.071945][ T6861] batman_adv: batadv0: Adding interface: veth1_to_team [ 1021.087174][ T6861] batman_adv: batadv0: The MTU of interface veth1_to_team is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1021.128855][ T6861] batman_adv: batadv0: Interface activated: veth1_to_team [ 1021.457554][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1021.466844][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1021.564813][ T6816] device veth0_vlan entered promiscuous mode [ 1021.578837][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1021.587464][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1021.596247][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1021.604603][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1021.663578][ T6816] device veth1_vlan entered promiscuous mode 08:39:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000068e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100946574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791f0485c2c2200000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0400000005004cb3e349c170f98c31a433100025", @ANYRES32=r3, @ANYBLOB="2004004af4f69cec618f03b76260bb9d5d40f661e2732ba8ec2b19434efb394afdfc32f3859c34cd3251719a3f553b441e20aaf802b0e6dd5859320073eb67a3aecf1892903a105e4316b8a25ffce91c776df85a36ada262e07c37bc34a05fcd9e7589b6a4234ae7a8614895bcc1ebaf52eba7c909c55e3dbf5d369a09a0626a36dcf798e732cf8622bd0450a07827a98232447a778adbb26e13711b6109"], 0x28}}, 0x0) 08:39:47 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:47 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1022.070183][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1022.079261][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1022.090585][ T6890] batman_adv: batadv0: Adding interface: vlan0 [ 1022.099024][ T6890] batman_adv: batadv0: The MTU of interface vlan0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1022.124881][ T6890] batman_adv: batadv0: Interface activated: vlan0 [ 1022.132626][ T6892] batman_adv: batadv0: Adding interface: veth11 [ 1022.139208][ T6892] batman_adv: batadv0: The MTU of interface veth11 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1022.167050][ T6892] batman_adv: batadv0: Not using interface veth11 (retrying later): interface not active 08:39:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a1000006ce3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010059757468f800000018002200fd0001000000c7ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef0100fdbe08b8c5236b93b9791fa60000000000007f63b73b2614bb358e8fd516c40679db1d06ab35c975af0e4c03bc970e088a406cbc65424d283910193ce95080f38b8fe2b34c8cb9b9a44a297cc663c481da318535f258f3cad4fb2ddb9cac5590e7b2527b626bc1a42bc9bf9b73414c46eb31dee5f9ddbf8b", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000f90f00621c07250800"/23, @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014000000"], 0x28}}, 0x0) 08:39:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1022.587645][ T6910] batman_adv: batadv0: Adding interface: ipvlan0 [ 1022.599649][ T6910] batman_adv: batadv0: The MTU of interface ipvlan0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1022.628355][ T6910] batman_adv: batadv0: Not using interface ipvlan0 (retrying later): interface not active [ 1022.639420][ T6911] batman_adv: batadv0: Adding interface: veth13 [ 1022.647654][ T6911] batman_adv: batadv0: The MTU of interface veth13 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1022.676346][ T6911] batman_adv: batadv0: Not using interface veth13 (retrying later): interface not active [ 1022.700891][ T8044] device bridge_slave_1 left promiscuous mode [ 1022.733041][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1022.816575][ T8044] device bridge_slave_0 left promiscuous mode [ 1022.842331][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1022.905911][ T8044] device bridge_slave_1 left promiscuous mode [ 1022.912133][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1022.963127][ T8044] device bridge_slave_0 left promiscuous mode [ 1022.969415][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1023.016422][ T8044] device veth1_vlan left promiscuous mode [ 1023.022283][ T8044] device veth0_vlan left promiscuous mode [ 1023.028172][ T8044] device veth1_vlan left promiscuous mode [ 1023.034178][ T8044] device veth0_vlan left promiscuous mode [ 1024.086783][ T0] NOHZ: local_softirq_pending 08 [ 1024.692310][ T8044] device hsr_slave_0 left promiscuous mode [ 1024.742150][ T8044] device hsr_slave_1 left promiscuous mode [ 1024.798537][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1024.809093][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1024.819513][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1024.865811][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1024.926379][ T8044] bond0 (unregistering): Released all slaves [ 1025.102400][ T8044] device hsr_slave_0 left promiscuous mode [ 1025.152201][ T8044] device hsr_slave_1 left promiscuous mode [ 1025.210465][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1025.221271][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1025.232455][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1025.265838][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1025.345503][ T8044] bond0 (unregistering): Released all slaves [ 1025.436303][ T6914] IPVS: ftp: loaded support on port[0] = 21 [ 1025.511710][ T6914] chnl_net:caif_netlink_parms(): no params data found [ 1025.542319][ T6914] bridge0: port 1(bridge_slave_0) entered blocking state [ 1025.549424][ T6914] bridge0: port 1(bridge_slave_0) entered disabled state [ 1025.557317][ T6914] device bridge_slave_0 entered promiscuous mode [ 1025.565578][ T6914] bridge0: port 2(bridge_slave_1) entered blocking state [ 1025.574270][ T6914] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.582086][ T6914] device bridge_slave_1 entered promiscuous mode [ 1025.598254][ T6914] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1025.653855][ T6914] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1025.731550][ T6914] team0: Port device team_slave_0 added [ 1025.738459][ T6914] team0: Port device team_slave_1 added [ 1025.814336][ T6914] device hsr_slave_0 entered promiscuous mode [ 1025.862369][ T6914] device hsr_slave_1 entered promiscuous mode [ 1025.942122][ T6914] debugfs: Directory 'hsr0' with parent '/' already present! [ 1025.976069][ T6914] bridge0: port 2(bridge_slave_1) entered blocking state [ 1025.983404][ T6914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1025.990661][ T6914] bridge0: port 1(bridge_slave_0) entered blocking state [ 1025.997712][ T6914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1026.039814][ T6914] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1026.056069][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1026.067415][ T5751] bridge0: port 1(bridge_slave_0) entered disabled state [ 1026.075778][ T5751] bridge0: port 2(bridge_slave_1) entered disabled state [ 1026.092487][ T6914] 8021q: adding VLAN 0 to HW filter on device team0 [ 1026.107460][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1026.116020][ T6129] bridge0: port 1(bridge_slave_0) entered blocking state [ 1026.123138][ T6129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1026.131045][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1026.139802][ T6129] bridge0: port 2(bridge_slave_1) entered blocking state [ 1026.146925][ T6129] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1026.178277][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1026.187229][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1026.206114][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1026.219950][ T6914] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1026.230618][ T6914] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1026.249680][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1026.257492][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1026.266070][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1026.275023][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1026.283611][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1026.302596][ T6914] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1026.372620][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1026.401081][ T6914] device veth0_vlan entered promiscuous mode [ 1026.412195][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1026.421628][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1026.431662][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1026.443349][ T6914] device veth1_vlan entered promiscuous mode [ 1026.462794][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1026.471089][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 08:39:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000074e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:52 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:52 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:52 executing program 2: pipe2$9p(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x400) write$P9_RRENAMEAT(r0, &(0x7f0000000a80)={0x7, 0x4b, 0x1}, 0x7) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x800, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz0\x00', {0x3, 0x4, 0x8, 0x3f}, 0x1d, [0x3ff, 0x739b21c7, 0x8, 0x3, 0x0, 0xffffffe1, 0xab7b, 0x0, 0x6, 0x6, 0x4, 0x9, 0x45, 0x0, 0x9, 0x5, 0x1, 0x2, 0x400, 0x5, 0x1, 0x40400, 0xa4000, 0x7ff, 0xffff, 0x8000, 0x8000, 0x8, 0x200, 0x919, 0x101, 0x0, 0x80000000, 0x1000, 0x7, 0x6, 0x4, 0x20, 0x7, 0x5, 0x2, 0xed1, 0xe5, 0x1, 0x1, 0x4363, 0x1000, 0x2, 0xfffffffc, 0x400, 0x5, 0x1ff, 0x6, 0x0, 0x9, 0x4, 0x8001, 0x1ff, 0x7, 0x5, 0x3, 0x8, 0x1000, 0x8000], [0xd0000000, 0x9, 0xeb2, 0x200, 0x8, 0x6, 0x4cf, 0x9000000, 0x8, 0x19, 0x0, 0x5, 0x401, 0x8001, 0x4, 0x2, 0x7f, 0x1f, 0x6, 0x9, 0x9, 0x4, 0xc191, 0x93e, 0x80000001, 0x6, 0x1aae, 0x8001, 0x0, 0xfffffffe, 0x1f, 0x7, 0x8, 0xfff, 0x4, 0x1f, 0x4, 0x774c, 0x401, 0xf3, 0x2, 0x3, 0x8, 0x9e, 0x10001, 0x1, 0x40, 0xacc, 0xb72, 0x72027049, 0x6, 0xfffffff8, 0x7ff, 0x3, 0x2, 0x2abe3074, 0x10001, 0x8, 0x7, 0x7, 0x7fffffff, 0x140000, 0x5, 0x401], [0x3, 0xffffffff, 0x401, 0x3, 0x20, 0x7, 0x8, 0x1, 0x26, 0x3, 0xffffffff, 0x7ff, 0x6, 0xffffffff, 0x4, 0x7, 0x9, 0x0, 0x0, 0x401, 0x0, 0xf3, 0x7, 0x2, 0x20, 0x394, 0x4, 0xfffff801, 0x4, 0xffffffc0, 0x1, 0x80000000, 0x6, 0xffffffff, 0x4, 0x3, 0x3ff, 0x400, 0x3, 0x40, 0x6, 0x5, 0x6, 0xcecf, 0xffff, 0x5, 0x6, 0x91d2, 0x4, 0x80, 0x0, 0x6, 0x3, 0x3, 0x2a, 0x1, 0x5, 0x7, 0x8, 0x7, 0x0, 0x5, 0x0, 0x10001], [0x9, 0x7, 0x1000, 0x1a, 0x8, 0x2, 0xfffffff7, 0x8, 0xfffffc01, 0x0, 0xffffffff, 0x7, 0x8, 0x10000, 0x0, 0x9, 0x6, 0x0, 0x3, 0xee63, 0x1, 0x1000, 0xfffffff7, 0x1, 0x0, 0x8, 0x19, 0xfffffffc, 0x7, 0x1, 0x9f7, 0x0, 0x4, 0x0, 0x7, 0x3, 0x80, 0xfffffffc, 0xfffffffb, 0x4, 0x4, 0xd9a1, 0x4, 0x1, 0x10000, 0x4, 0xc15e, 0xfda, 0x3, 0x3e058dc7, 0x9, 0x9, 0x40, 0xffffffff, 0x550ed8fb, 0x6, 0xf1e, 0xaf02, 0x10001, 0x5, 0x3, 0x5, 0x9a, 0xffffff80]}, 0x45c) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa600"/86, @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r6, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x6, 0x0) flock(r7, 0xb) setsockopt$inet_tcp_TLS_TX(r6, 0x6, 0x1, &(0x7f0000000ac0)=@gcm_256={{0x303}, "b5b45d79d07bc9df", "7f444388ab66beb33b700e137494f2ab155aad44313d1fd20e6cc0923daccd6b", "8cc55333", "ed0d95db3f935843"}, 0x38) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r8, 0x0) r9 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000340)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r8, &(0x7f0000000900)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r9, 0x20, 0x70bd28, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x40) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r10 = socket$unix(0x1, 0x2, 0x0) r11 = socket$unix(0x1, 0x1, 0x0) r12 = dup2(r11, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$PIO_UNISCRNMAP(r12, 0x4b6a, &(0x7f0000000b00)="4f2b90ee4bf318e087d75604ab6ebb129ae5f6f58b7c") r13 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r14 = ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r14, 0xae41, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000940)) ioctl$KVM_SET_USER_MEMORY_REGION(r14, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000002c0)={0xfcd8000, 0x8000, 0x9, r14, 0x0, &(0x7f0000000240)={0x9c0902, 0x4, [], @value=0x7fffffff}}) ioctl$KVM_CREATE_VM(r15, 0xae01, 0x0) 08:39:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1026.620572][ T6934] batman_adv: batadv0: Adding interface: veth3 [ 1026.636508][ T6934] batman_adv: batadv0: The MTU of interface veth3 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1026.708474][ T6934] batman_adv: batadv0: Not using interface veth3 (retrying later): interface not active [ 1026.719414][ T8044] tipc: TX() has been purged, node left! [ 1026.738693][ T6933] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1026.768571][ T6939] batman_adv: batadv0: Adding interface: veth15 [ 1026.781555][ T6939] batman_adv: batadv0: The MTU of interface veth15 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1026.842126][ T6939] batman_adv: batadv0: Not using interface veth15 (retrying later): interface not active 08:39:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:52 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a1000007ae3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1027.235844][ T6948] batman_adv: batadv0: Adding interface: veth5 [ 1027.259544][ T6948] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:39:53 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f00000002c0)={0x30, "b74c333d1985893c71740341bc1ca0cecff459160957b42b4cb9e1221fc7f618afdd5b23544eb6511532e772a7f07926e7d21384eb69528788eebf49b26780f2de0c6589d145cd7c33203edda05e50c9e79e492aecb77796b01040ec7a4fb42fae8d0528ea778de3c9690f3ceba4be2ce065e8931813d0569b5e4b96e04ec99d"}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000480)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$unix(0x1, 0x2, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f0000000540)=0x8) clone3(&(0x7f00000005c0)={0x1000, &(0x7f0000000140), &(0x7f0000000240), &(0x7f0000000380), {0x3f}, &(0x7f00000003c0)=""/18, 0x12, &(0x7f0000000540), &(0x7f0000000580)=[0x0, r4, 0xffffffffffffffff, r5, 0x0, r6], 0x6}, 0x50) sendmsg$nl_route(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@RTM_NEWNSID={0x24, 0x58, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4c040}, 0x0) [ 1027.431870][ T6948] batman_adv: batadv0: Not using interface veth5 (retrying later): interface not active [ 1027.507403][ T6958] batman_adv: batadv0: Adding interface: veth17 [ 1027.514049][ T6958] batman_adv: batadv0: The MTU of interface veth17 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1027.545461][ T6958] batman_adv: batadv0: Not using interface veth17 (retrying later): interface not active 08:39:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1027.835102][ T6968] batman_adv: batadv0: Adding interface: veth7 [ 1027.861277][ T6968] batman_adv: batadv0: The MTU of interface veth7 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1027.972697][ T6968] batman_adv: batadv0: Not using interface veth7 (retrying later): interface not active [ 1028.488055][ T8044] device bridge_slave_1 left promiscuous mode [ 1028.502238][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1028.552697][ T8044] device bridge_slave_0 left promiscuous mode [ 1028.558919][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1028.625334][ T8044] device veth1_vlan left promiscuous mode [ 1028.641296][ T8044] device veth0_vlan left promiscuous mode [ 1029.592313][ T8044] device hsr_slave_0 left promiscuous mode [ 1029.642307][ T8044] device hsr_slave_1 left promiscuous mode [ 1029.709080][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1029.719449][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1029.729579][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1029.767520][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1029.847748][ T8044] bond0 (unregistering): Released all slaves [ 1029.971824][ T6974] IPVS: ftp: loaded support on port[0] = 21 [ 1029.971957][ T6976] IPVS: ftp: loaded support on port[0] = 21 [ 1030.112130][ T6974] chnl_net:caif_netlink_parms(): no params data found [ 1030.185109][ T6974] bridge0: port 1(bridge_slave_0) entered blocking state [ 1030.192318][ T6974] bridge0: port 1(bridge_slave_0) entered disabled state [ 1030.200219][ T6974] device bridge_slave_0 entered promiscuous mode [ 1030.213326][ T6976] chnl_net:caif_netlink_parms(): no params data found [ 1030.226022][ T6974] bridge0: port 2(bridge_slave_1) entered blocking state [ 1030.233751][ T6974] bridge0: port 2(bridge_slave_1) entered disabled state [ 1030.241801][ T6974] device bridge_slave_1 entered promiscuous mode [ 1030.290485][ T6974] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1030.306221][ T6976] bridge0: port 1(bridge_slave_0) entered blocking state [ 1030.317579][ T6976] bridge0: port 1(bridge_slave_0) entered disabled state [ 1030.326263][ T6976] device bridge_slave_0 entered promiscuous mode [ 1030.338789][ T6974] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1030.349098][ T6976] bridge0: port 2(bridge_slave_1) entered blocking state [ 1030.359719][ T6976] bridge0: port 2(bridge_slave_1) entered disabled state [ 1030.368684][ T6976] device bridge_slave_1 entered promiscuous mode [ 1030.408548][ T6974] team0: Port device team_slave_0 added [ 1030.420649][ T6974] team0: Port device team_slave_1 added [ 1030.428728][ T6976] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1030.497654][ T6974] device hsr_slave_0 entered promiscuous mode [ 1030.552418][ T6974] device hsr_slave_1 entered promiscuous mode [ 1030.592142][ T6974] debugfs: Directory 'hsr0' with parent '/' already present! [ 1030.601250][ T6976] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1030.621113][ T6976] team0: Port device team_slave_0 added [ 1030.628141][ T6976] team0: Port device team_slave_1 added [ 1030.693968][ T6976] device hsr_slave_0 entered promiscuous mode [ 1030.742427][ T6976] device hsr_slave_1 entered promiscuous mode [ 1030.792225][ T6976] debugfs: Directory 'hsr0' with parent '/' already present! [ 1030.830205][ T6974] bridge0: port 2(bridge_slave_1) entered blocking state [ 1030.837300][ T6974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1030.844615][ T6974] bridge0: port 1(bridge_slave_0) entered blocking state [ 1030.851696][ T6974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1030.900791][ T6976] bridge0: port 2(bridge_slave_1) entered blocking state [ 1030.907936][ T6976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1030.915396][ T6976] bridge0: port 1(bridge_slave_0) entered blocking state [ 1030.922447][ T6976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1030.941353][ T6974] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1030.960110][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1030.968752][ T7993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1030.979593][ T7993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1030.989202][ T7993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1030.997792][ T7993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1031.023208][ T6976] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1031.042066][ T6974] 8021q: adding VLAN 0 to HW filter on device team0 [ 1031.055638][ T6976] 8021q: adding VLAN 0 to HW filter on device team0 [ 1031.064158][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1031.072662][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1031.092552][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1031.101144][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1031.110278][ T8530] bridge0: port 1(bridge_slave_0) entered blocking state [ 1031.117409][ T8530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1031.125695][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1031.134607][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1031.143393][ T8530] bridge0: port 1(bridge_slave_0) entered blocking state [ 1031.150421][ T8530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1031.158370][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1031.167134][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1031.175650][ T8530] bridge0: port 2(bridge_slave_1) entered blocking state [ 1031.182703][ T8530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1031.190137][ T8044] tipc: TX() has been purged, node left! [ 1031.191132][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1031.204814][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1031.213339][ T8530] bridge0: port 2(bridge_slave_1) entered blocking state [ 1031.220350][ T8530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1031.228214][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1031.237205][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1031.246136][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1031.255055][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1031.275055][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1031.283909][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1031.299005][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1031.307670][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1031.316819][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1031.325180][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1031.333531][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1031.341849][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1031.350161][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1031.358804][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1031.369589][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1031.377937][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1031.386443][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1031.395498][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1031.405749][ T6976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1031.469770][ T6974] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1031.480394][ T6974] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1031.518010][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1031.526658][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1031.535737][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1031.544401][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1031.563103][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1031.570817][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1031.578588][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1031.586322][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1031.594298][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1031.632283][ T6976] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1031.642259][ T6974] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1031.724532][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1031.733450][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1031.760597][ T6974] device veth0_vlan entered promiscuous mode [ 1031.796385][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1031.805293][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1031.814123][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1031.822918][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1031.831970][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1031.840228][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1031.854391][ T6974] device veth1_vlan entered promiscuous mode [ 1031.861105][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1031.869223][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1031.880605][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1031.889532][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1031.897771][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1031.908309][ T6976] device veth0_vlan entered promiscuous mode [ 1031.947666][ T6976] device veth1_vlan entered promiscuous mode [ 1032.059395][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1032.067826][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1032.076420][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 08:39:57 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a100000fde3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x500, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8983, &(0x7f0000000140)={0x8, 'vlan1\x00', {'ipvlan0\x00'}, 0x2}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r3, 0x0) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x79) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:39:57 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1032.198402][ T7001] batman_adv: batadv0: Adding interface: veth9 [ 1032.208102][ T7001] batman_adv: batadv0: The MTU of interface veth9 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:39:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xa8c0}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_MGMT_A_DOMAIN={0x1a, 0x1, '\'posix_acl_accesseth1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x10) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$unix(0x1, 0x2, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = dup2(r6, r5) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r7, 0x2) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="4800000010001b070000000000000000000000002bb8b3d08aebbde925a8e2c812d228832133ebb66b5c2f1a5a48e69ece4db2328b38b69bed0f9728b507015f1df7e403b8dc486d056669d23d92cdc19f", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8000104bde5bf29b6fe566b93b9791fa6000000000000be877bf1f11c8c80449e3305a07f13c20629f81c6d904121772f8f143f92cd0bac4222ab92767e1a926b013a16b7dc65c13e6d8b78d34c51dbe27dca1572443229db33d50a7b412de74fb93a1e0f01c55c81f9fa1fc285d42e68fcb7889e3e32053b0eccdee4503350562f8ac095ee69860360924d5c32a66792678a46d32121462891df6b8f947cfe3f99803fc06e359e72691b450267f81d9bb53f5ca7c19223179a6e7aa3113c21df36c69b9eea346bc08f50031699b21381c06728ce99c43543e112ab1648bcf5a694a45300155a031a9c67b54274e611f9384d6e8670936c9cc34a1fa2d2c5cdcc584cd9", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1032.252186][ T7001] batman_adv: batadv0: Not using interface veth9 (retrying later): interface not active [ 1032.405310][ T7006] batman_adv: batadv0: Adding interface: veth19 [ 1032.411930][ T7006] batman_adv: batadv0: The MTU of interface veth19 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1032.437839][ T7006] batman_adv: batadv0: Not using interface veth19 (retrying later): interface not active 08:39:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1032.455264][ T7004] 8021q: adding VLAN 0 to HW filter on device @ 08:39:58 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:39:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x600, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1032.569452][ T7013] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1032.595559][ T8044] device bridge_slave_1 left promiscuous mode [ 1032.601959][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state 08:39:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a100000fee3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:39:58 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1032.661399][ T8044] device bridge_slave_0 left promiscuous mode [ 1032.672478][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1032.765902][ T8044] device veth1_vlan left promiscuous mode [ 1032.771860][ T8044] device veth0_vlan left promiscuous mode [ 1034.002547][ T8044] device hsr_slave_0 left promiscuous mode [ 1034.042131][ T8044] device hsr_slave_1 left promiscuous mode [ 1034.099172][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1034.109951][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1034.120798][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1034.166745][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1034.228394][ T8044] bond0 (unregistering): Released all slaves [ 1034.299857][ T7019] batman_adv: batadv0: Adding interface: veth13 [ 1034.306690][ T7019] batman_adv: batadv0: The MTU of interface veth13 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1034.332781][ T7019] batman_adv: batadv0: Not using interface veth13 (retrying later): interface not active 08:40:00 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1034.343627][ T7013] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 08:40:00 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x23, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB='H\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="0000050000000000280012000c000100766574680000070000000000000001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="9c97152139f5b40aff20a6db53309c940b660a37b18ed77af84bd5bc69b0cbcbb829009b6e7ca2ed64c237fda7a4b125d6eefccd896be974c2880b33af2f76648e1d13c97f613cba08ea3b15fb2924aab71add4ab477a932aea4cdf1908a1e7d935549bdc82f92c6a076dd3f7e1b38657ee1d042ace57db4072aa9a8e989dc260d8f2917c47b7f"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="00ffff000000000000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014000000"], 0x3}}, 0x20004085) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r4, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="08000000000000003759540d01ab34043c0c5dd3cb8ae68603d020ce89f347f8591d620000000000004f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439795fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463e725ffcc2357e053c0ba88cdce1e394b0c4896e51eec2510cf313e048bdfc66a909b2c74725babeb9abef9991ba14034a0f0c25ea352eb1d591151c21b5644fe8c324124ac48de197f7ce4f8c992bc70136ca23903674509ddecb59b352e2002d66cc0ab64f4b3b802b02ab7503f58904cf4e86361311d7548bd58ac63eb02f88939257b0043d61d9fdb87dd98cd0df34d1d475543e38f364fbbbf", 0x101, r7) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x0}, &(0x7f00000005c0)="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", 0xfd, r7) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = socket$unix(0x1, 0x2, 0x0) r9 = socket$unix(0x1, 0x1, 0x0) r10 = dup2(r9, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) accept4$netrom(r10, &(0x7f0000000480)={{0x3, @rose}, [@null, @netrom, @rose, @netrom, @default, @default, @bcast, @rose]}, &(0x7f0000000500)=0x48, 0x400) r11 = dup2(r2, r4) syz_open_dev$amidi(&(0x7f0000000800)='/dev/amidi#\x00', 0x7fffffff, 0x400000) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0x3c, 0x9, 0x5, 0x0, 0x0, 0x8, 0x800a, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x94, 0x4, @perf_config_ext={0x91fe, 0x7}, 0x2000, 0x0, 0x204b4, 0x7, 0x7, 0xfffffff7, 0x4b}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r10, 0x84, 0x72, &(0x7f0000000140)={0x0, 0xffffff04, 0x18}, &(0x7f0000000240)=0x2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x220002, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f00000002c0)={r12, 0x7ff}, 0x8) [ 1034.467598][ T7026] batman_adv: batadv0: Adding interface: veth21 [ 1034.492318][ T7026] batman_adv: batadv0: The MTU of interface veth21 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1034.562237][ T7026] batman_adv: batadv0: Not using interface veth21 (retrying later): interface not active [ 1034.583760][ T7027] 8021q: adding VLAN 0 to HW filter on device @ 08:40:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x48, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r2, 0x0) sendmsg$IPSET_CMD_ADD(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1090020}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x9, 0x6, 0x10, 0x70bd2c, 0x25dfdbfd, {0x7, 0x0, 0x1}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008890}, 0x20000000) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1034.766620][ T7034] 8021q: adding VLAN 0 to HW filter on device @ [ 1034.928516][ T7051] batman_adv: batadv0: Adding interface: veth15 08:40:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd0afb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1034.967688][ T7051] batman_adv: batadv0: The MTU of interface veth15 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0x9, 0xffff7fff) [ 1035.142188][ T7051] batman_adv: batadv0: Not using interface veth15 (retrying later): interface not active [ 1035.190422][ T7050] batman_adv: batadv0: Adding interface: veth23 [ 1035.200251][ T7050] batman_adv: batadv0: The MTU of interface veth23 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1035.235684][ T7050] batman_adv: batadv0: Not using interface veth23 (retrying later): interface not active [ 1035.270472][ T7054] IPVS: ftp: loaded support on port[0] = 21 [ 1035.365000][ T7059] 8021q: adding VLAN 0 to HW filter on device @ [ 1035.416035][ T7062] batman_adv: batadv0: Adding interface: veth9 08:40:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4c, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa00, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1035.442519][ T7062] batman_adv: batadv0: The MTU of interface veth9 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1035.551817][ T7062] batman_adv: batadv0: Not using interface veth9 (retrying later): interface not active [ 1035.675161][ T7059] 8021q: adding VLAN 0 to HW filter on device @ [ 1035.706043][ T7070] batman_adv: batadv0: Adding interface: veth17 [ 1035.738834][ T7070] batman_adv: batadv0: The MTU of interface veth17 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$getsig(0x4202, r4, 0x7fffffff, &(0x7f00000002c0)) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000240)=0x1, 0x4) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000340)=0x1, 0x4) [ 1035.858618][ T7070] batman_adv: batadv0: Not using interface veth17 (retrying later): interface not active [ 1035.904386][ T7071] batman_adv: batadv0: Adding interface: veth25 [ 1035.932149][ T7071] batman_adv: batadv0: The MTU of interface veth25 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1035.972621][ T7071] batman_adv: batadv0: Not using interface veth25 (retrying later): interface not active [ 1036.005935][ T7076] batman_adv: batadv0: Adding interface: veth11 [ 1036.042749][ T7076] batman_adv: batadv0: The MTU of interface veth11 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1036.089878][ T7076] batman_adv: batadv0: Not using interface veth11 (retrying later): interface not active [ 1036.233974][ T7054] chnl_net:caif_netlink_parms(): no params data found [ 1036.278915][ T7054] bridge0: port 1(bridge_slave_0) entered blocking state [ 1036.286112][ T7054] bridge0: port 1(bridge_slave_0) entered disabled state [ 1036.293996][ T7054] device bridge_slave_0 entered promiscuous mode [ 1036.301499][ T7054] bridge0: port 2(bridge_slave_1) entered blocking state [ 1036.308690][ T7054] bridge0: port 2(bridge_slave_1) entered disabled state [ 1036.316465][ T7054] device bridge_slave_1 entered promiscuous mode [ 1036.336334][ T7054] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1036.347095][ T7054] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1036.365820][ T7054] team0: Port device team_slave_0 added [ 1036.372653][ T7054] team0: Port device team_slave_1 added [ 1036.434253][ T7054] device hsr_slave_0 entered promiscuous mode [ 1036.462492][ T7054] device hsr_slave_1 entered promiscuous mode [ 1036.492178][ T7054] debugfs: Directory 'hsr0' with parent '/' already present! [ 1036.518603][ T7054] bridge0: port 2(bridge_slave_1) entered blocking state [ 1036.525843][ T7054] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1036.533116][ T7054] bridge0: port 1(bridge_slave_0) entered blocking state [ 1036.540163][ T7054] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1036.577278][ T7054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1036.589475][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1036.597621][ T8530] bridge0: port 1(bridge_slave_0) entered disabled state [ 1036.605909][ T8530] bridge0: port 2(bridge_slave_1) entered disabled state [ 1036.618763][ T7054] 8021q: adding VLAN 0 to HW filter on device team0 [ 1036.630069][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1036.638463][ T7993] bridge0: port 1(bridge_slave_0) entered blocking state [ 1036.645615][ T7993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1036.662198][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1036.671689][ T8530] bridge0: port 2(bridge_slave_1) entered blocking state [ 1036.678898][ T8530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1036.700115][ T7054] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1036.710913][ T7054] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1036.722214][ T8044] tipc: TX() has been purged, node left! [ 1036.730028][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1036.738170][ T8044] tipc: TX() has been purged, node left! [ 1036.739528][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1036.752722][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1036.761281][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1036.770624][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1036.778950][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1036.793229][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1036.800653][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1036.811358][ T7054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1036.956090][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1036.965020][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1037.033429][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1037.041773][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1037.050963][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1037.059773][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1037.133761][ T7054] device veth0_vlan entered promiscuous mode [ 1037.145194][ T7054] device veth1_vlan entered promiscuous mode [ 1037.264981][ T7089] IPVS: ftp: loaded support on port[0] = 21 08:40:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd25fb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1037.453280][ T7099] batman_adv: batadv0: Adding interface: veth19 [ 1037.463484][ T7099] batman_adv: batadv0: The MTU of interface veth19 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1037.490406][ T7099] batman_adv: batadv0: Not using interface veth19 (retrying later): interface not active [ 1037.557933][ T7098] 8021q: adding VLAN 0 to HW filter on device @ [ 1037.717924][ T7089] chnl_net:caif_netlink_parms(): no params data found [ 1037.747841][ T7089] bridge0: port 1(bridge_slave_0) entered blocking state [ 1037.755191][ T7089] bridge0: port 1(bridge_slave_0) entered disabled state [ 1037.763171][ T7089] device bridge_slave_0 entered promiscuous mode [ 1037.770655][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1037.779331][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1037.836223][ T7089] bridge0: port 2(bridge_slave_1) entered blocking state [ 1037.843713][ T7089] bridge0: port 2(bridge_slave_1) entered disabled state [ 1037.851613][ T7089] device bridge_slave_1 entered promiscuous mode [ 1037.870286][ T7089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1037.926296][ T7089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1037.945953][ T7089] team0: Port device team_slave_0 added [ 1037.953857][ T8044] device bridge_slave_1 left promiscuous mode [ 1037.960169][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1038.003312][ T8044] device bridge_slave_0 left promiscuous mode [ 1038.009493][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1038.055390][ T8044] device bridge_slave_1 left promiscuous mode [ 1038.061600][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1038.113453][ T8044] device bridge_slave_0 left promiscuous mode [ 1038.119622][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1038.177551][ T8044] device veth1_vlan left promiscuous mode [ 1038.183482][ T8044] device veth0_vlan left promiscuous mode [ 1038.189432][ T8044] device veth1_vlan left promiscuous mode [ 1038.195476][ T8044] device veth0_vlan left promiscuous mode [ 1039.882441][ T8044] device hsr_slave_0 left promiscuous mode [ 1039.952162][ T8044] device hsr_slave_1 left promiscuous mode [ 1040.009247][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1040.019991][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1040.030106][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1040.086984][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1040.165919][ T8044] bond0 (unregistering): Released all slaves [ 1040.362398][ T8044] device hsr_slave_0 left promiscuous mode [ 1040.402451][ T8044] device hsr_slave_1 left promiscuous mode [ 1040.461204][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1040.471857][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1040.487317][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1040.526382][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1040.586117][ T8044] bond0 (unregistering): Released all slaves [ 1040.685671][ T7089] team0: Port device team_slave_1 added [ 1040.754462][ T7089] device hsr_slave_0 entered promiscuous mode [ 1040.782444][ T7089] device hsr_slave_1 entered promiscuous mode [ 1040.842212][ T7089] debugfs: Directory 'hsr0' with parent '/' already present! [ 1040.896246][ T7089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1040.908129][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1040.915996][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1040.925910][ T7089] 8021q: adding VLAN 0 to HW filter on device team0 [ 1040.936118][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1040.944913][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1040.953637][ T6050] bridge0: port 1(bridge_slave_0) entered blocking state [ 1040.960671][ T6050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1040.969522][ T8530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1041.086637][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1041.095642][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1041.107264][ T6050] bridge0: port 2(bridge_slave_1) entered blocking state [ 1041.114327][ T6050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1041.140827][ T7089] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1041.151496][ T7089] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1041.164521][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1041.174089][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1041.183643][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1041.193381][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1041.202770][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1041.211545][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1041.221161][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1041.230005][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1041.248449][ T7089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1041.256745][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1041.265314][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1041.274029][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1041.281473][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1041.349371][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1041.365498][ T7089] device veth0_vlan entered promiscuous mode [ 1041.378478][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1041.391032][ T7089] device veth1_vlan entered promiscuous mode [ 1041.401288][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1041.410121][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1041.421087][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 08:40:07 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc00, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb450009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r4, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x68, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1041.702370][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 08:40:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="4800000000000507000800010000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1041.923190][ T7123] batman_adv: batadv0: Adding interface: veth27 [ 1041.929539][ T7123] batman_adv: batadv0: The MTU of interface veth27 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1042.017507][ T7123] batman_adv: batadv0: Not using interface veth27 (retrying later): interface not active [ 1042.057535][ T7133] 8021q: adding VLAN 0 to HW filter on device @ 08:40:07 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1042.070494][ T7134] batman_adv: batadv0: Adding interface: veth21 [ 1042.077333][ T7134] batman_adv: batadv0: The MTU of interface veth21 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1042.106899][ T7134] batman_adv: batadv0: Not using interface veth21 (retrying later): interface not active 08:40:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe00, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x4, 0x1) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x68, r5, 0x101, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @media='udp\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1280000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x68, r5, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x4, @media='udp\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xc}, 0x1088) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1042.355507][ T7141] 8021q: adding VLAN 0 to HW filter on device @ 08:40:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb002009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1042.537010][ T7148] batman_adv: batadv0: Adding interface: veth23 [ 1042.543949][ T7148] batman_adv: batadv0: The MTU of interface veth23 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1042.569744][ T7148] batman_adv: batadv0: Not using interface veth23 (retrying later): interface not active 08:40:08 executing program 4: fstat(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1042.582784][ T7149] batman_adv: batadv0: Adding interface: veth31 [ 1042.594749][ T7149] batman_adv: batadv0: The MTU of interface veth31 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1042.624101][ T7149] batman_adv: batadv0: Not using interface veth31 (retrying later): interface not active 08:40:08 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3f00, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:08 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250003000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1042.902114][ T8044] tipc: TX() has been purged, node left! [ 1042.908226][ T8044] tipc: TX() has been purged, node left! 08:40:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r9 = socket$unix(0x1, 0x2, 0x0) r10 = socket$unix(0x1, 0x1, 0x0) r11 = dup2(r10, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) connect$rds(r11, &(0x7f0000000240)={0x2, 0x4e22, @rand_addr=0x4}, 0x10) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@setlink={0x20, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0xf0ffff}}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x30044}, [@IFLA_PROTO_DOWN={0x5, 0xa, 0x14}]}, 0x28}}, 0x11) [ 1042.961441][ T7168] batman_adv: batadv0: Adding interface: veth33 [ 1043.005127][ T7168] batman_adv: batadv0: The MTU of interface veth33 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1043.102108][ T7168] batman_adv: batadv0: Not using interface veth33 (retrying later): interface not active [ 1043.309539][ T7175] 8021q: adding VLAN 0 to HW filter on device @ [ 1043.322011][ T7176] batman_adv: batadv0: Adding interface: veth27 [ 1043.329008][ T7176] batman_adv: batadv0: The MTU of interface veth27 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1043.357976][ T7176] batman_adv: batadv0: Not using interface veth27 (retrying later): interface not active 08:40:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7a, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1043.656452][ T7181] 8021q: adding VLAN 0 to HW filter on device @ [ 1043.698090][ T7188] batman_adv: batadv0: Adding interface: veth29 08:40:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250005000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014000000"], 0x28}}, 0x0) [ 1043.733573][ T7188] batman_adv: batadv0: The MTU of interface veth29 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1043.870137][ T7188] batman_adv: batadv0: Not using interface veth29 (retrying later): interface not active [ 1043.901599][ T7189] batman_adv: batadv0: Adding interface: veth35 [ 1043.915108][ T7189] batman_adv: batadv0: The MTU of interface veth35 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1043.965243][ T7189] batman_adv: batadv0: Not using interface veth35 (retrying later): interface not active [ 1044.195235][ T7198] 8021q: adding VLAN 0 to HW filter on device @ 08:40:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1044.452336][ T7204] batman_adv: batadv0: Adding interface: veth31 [ 1044.458717][ T7204] batman_adv: batadv0: The MTU of interface veth31 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1044.537679][ T7204] batman_adv: batadv0: Not using interface veth31 (retrying later): interface not active [ 1045.071256][ T7209] IPVS: ftp: loaded support on port[0] = 21 [ 1045.122921][ T7209] chnl_net:caif_netlink_parms(): no params data found [ 1045.196662][ T7209] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.204142][ T7209] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.211932][ T7209] device bridge_slave_0 entered promiscuous mode [ 1045.220101][ T7209] bridge0: port 2(bridge_slave_1) entered blocking state [ 1045.227287][ T7209] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.235337][ T7209] device bridge_slave_1 entered promiscuous mode [ 1045.254851][ T7209] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1045.266007][ T8044] device bridge_slave_1 left promiscuous mode [ 1045.272543][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.332779][ T8044] device bridge_slave_0 left promiscuous mode [ 1045.338943][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.395150][ T8044] device bridge_slave_1 left promiscuous mode [ 1045.401302][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.433195][ T8044] device bridge_slave_0 left promiscuous mode [ 1045.439469][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.497639][ T8044] device veth1_vlan left promiscuous mode [ 1045.503450][ T8044] device veth0_vlan left promiscuous mode [ 1045.509278][ T8044] device veth1_vlan left promiscuous mode [ 1045.515148][ T8044] device veth0_vlan left promiscuous mode [ 1047.182383][ T8044] device hsr_slave_0 left promiscuous mode [ 1047.222228][ T8044] device hsr_slave_1 left promiscuous mode [ 1047.289598][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1047.299911][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1047.309396][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1047.355363][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1047.414954][ T8044] bond0 (unregistering): Released all slaves [ 1047.592556][ T8044] device hsr_slave_0 left promiscuous mode [ 1047.632222][ T8044] device hsr_slave_1 left promiscuous mode [ 1047.699042][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1047.709815][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1047.720839][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1047.756238][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1047.824918][ T8044] bond0 (unregistering): Released all slaves [ 1047.946242][ T7209] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1047.967183][ T7209] team0: Port device team_slave_0 added [ 1047.974563][ T7209] team0: Port device team_slave_1 added [ 1047.977505][ T7212] IPVS: ftp: loaded support on port[0] = 21 [ 1048.033946][ T7209] device hsr_slave_0 entered promiscuous mode [ 1048.082583][ T7209] device hsr_slave_1 entered promiscuous mode [ 1048.122132][ T7209] debugfs: Directory 'hsr0' with parent '/' already present! [ 1048.208097][ T7212] chnl_net:caif_netlink_parms(): no params data found [ 1048.326253][ T7212] bridge0: port 1(bridge_slave_0) entered blocking state [ 1048.333771][ T7212] bridge0: port 1(bridge_slave_0) entered disabled state [ 1048.341770][ T7212] device bridge_slave_0 entered promiscuous mode [ 1048.360544][ T7209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1048.371833][ T7212] bridge0: port 2(bridge_slave_1) entered blocking state [ 1048.379159][ T7212] bridge0: port 2(bridge_slave_1) entered disabled state [ 1048.390544][ T7212] device bridge_slave_1 entered promiscuous mode [ 1048.408594][ T7209] 8021q: adding VLAN 0 to HW filter on device team0 [ 1048.418912][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1048.430342][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1048.461015][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1048.470389][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1048.481747][ T7993] bridge0: port 1(bridge_slave_0) entered blocking state [ 1048.488803][ T7993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1048.496958][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1048.505840][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1048.514253][ T7993] bridge0: port 2(bridge_slave_1) entered blocking state [ 1048.521416][ T7993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1048.529223][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1048.538457][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1048.547794][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1048.557050][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1048.569591][ T7212] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1048.590807][ T7209] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1048.605871][ T7209] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1048.618997][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1048.627717][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1048.636587][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1048.645794][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1048.654938][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1048.665156][ T7212] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1048.682315][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1048.690691][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1048.698669][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1048.712671][ T7209] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1048.727407][ T7212] team0: Port device team_slave_0 added [ 1048.737524][ T7212] team0: Port device team_slave_1 added [ 1048.794174][ T7212] device hsr_slave_0 entered promiscuous mode [ 1048.812555][ T7212] device hsr_slave_1 entered promiscuous mode [ 1048.852159][ T7212] debugfs: Directory 'hsr0' with parent '/' already present! [ 1048.910184][ T7212] bridge0: port 2(bridge_slave_1) entered blocking state [ 1048.917309][ T7212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1048.924626][ T7212] bridge0: port 1(bridge_slave_0) entered blocking state [ 1048.931777][ T7212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1048.946739][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1048.959539][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1048.968910][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.004212][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1049.013091][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1049.027460][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1049.035325][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1049.048762][ T7209] device veth0_vlan entered promiscuous mode [ 1049.061650][ T7209] device veth1_vlan entered promiscuous mode [ 1049.085864][ T7212] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1049.106491][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1049.114901][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1049.133045][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1049.142905][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1049.174839][ T7212] 8021q: adding VLAN 0 to HW filter on device team0 [ 1049.194047][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1049.203098][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1049.211422][ T5781] bridge0: port 1(bridge_slave_0) entered blocking state 08:40:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250006000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5865, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000240)) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[]}}, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x84) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x41, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r7, r6, 0xd, 0x2}, 0xd) r8 = openat$cgroup_procs(r7, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r9 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r9, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r8, &(0x7f0000000580)=r10, 0x12) r11 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$EXT4_IOC_SWAP_BOOT(r11, 0x6611) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x0, 0x8, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r10, r11, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r5, r3, 0x0, 0xf, &(0x7f00000002c0)='/dev/vhost-net\x00', r12}, 0x30) r14 = accept(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000003c0)=0x80) r15 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r16 = ioctl$KVM_CREATE_VM(r15, 0xae01, 0x0) r17 = ioctl$KVM_CREATE_VCPU(r16, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r17, &(0x7f0000000000/0x18000)=nil, 0x0, 0x47, 0x0, 0x0, 0xffffffffffffff3c) ioctl$KVM_RUN(r17, 0xae80, 0x0) kcmp(0xffffffffffffffff, r13, 0x4, r14, r17) [ 1049.218494][ T5781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1049.230999][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1049.240974][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1049.251861][ T6071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1049.258973][ T6071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1049.286313][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1049.296448][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1049.317381][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1049.326456][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1049.338850][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1049.347156][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1049.356094][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1049.408448][ T7229] 8021q: adding VLAN 0 to HW filter on device @ [ 1049.419644][ T7230] batman_adv: batadv0: Adding interface: veth37 [ 1049.428323][ T7230] batman_adv: batadv0: The MTU of interface veth37 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1049.453998][ T7230] batman_adv: batadv0: Not using interface veth37 (retrying later): interface not active [ 1049.653854][ T7233] 8021q: adding VLAN 0 to HW filter on device @ [ 1049.660781][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1049.680318][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1049.700782][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1049.727262][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1049.740242][ T7212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1049.782203][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1049.789964][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1049.805200][ T7212] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1049.832904][ T8044] tipc: TX() has been purged, node left! [ 1049.965902][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1049.974853][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1049.991748][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1050.000433][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1050.036132][ T7212] device veth0_vlan entered promiscuous mode [ 1050.043199][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1050.051136][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1050.063166][ T7212] device veth1_vlan entered promiscuous mode 08:40:15 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:15 executing program 4: fstat(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PORT_SELF={0x18, 0x19, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "3a47f2109df0d89415dac96cd7cdff21"}]}]}, 0x38}}, 0x0) 08:40:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250007000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x500, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1050.583551][ T7256] 8021q: adding VLAN 0 to HW filter on device @ [ 1050.600906][ T7253] batman_adv: batadv0: Adding interface: veth39 [ 1050.617457][ T7253] batman_adv: batadv0: The MTU of interface veth39 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1050.675584][ T7253] batman_adv: batadv0: Not using interface veth39 (retrying later): interface not active [ 1050.703028][ T7257] batman_adv: batadv0: Adding interface: veth33 [ 1050.710518][ T7257] batman_adv: batadv0: The MTU of interface veth33 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1050.742118][ T7257] batman_adv: batadv0: Not using interface veth33 (retrying later): interface not active 08:40:16 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:16 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'ah\x00'}, &(0x7f00000000c0)=0x1e) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e22, @multicast2}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) 08:40:16 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1050.937334][ T7259] 8021q: adding VLAN 0 to HW filter on device @ 08:40:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb252008000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="0000001400018000000000bc56000000d2120f2b76ac53e98d5baa11caceafa0ddb0d3dbc7f2b39caa266d4755b3d45b3997fd832ae21f9e00b0ab61a4600fe9968952774268e30c3164e3089acccc7cf65cb464417607473f962246d4daa29b5d6cb3d7625916529679ad43fce87b6fe36475e1441beb88006c613e5574b9c021ed7eba42e6106e3a5711a02ce661b7ca2699a735"], 0x28}}, 0x0) 08:40:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x600, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6558, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1051.192157][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1051.211910][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1051.338282][ T7273] 8021q: adding VLAN 0 to HW filter on device @ [ 1051.387861][ T7281] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1051.397730][ T7282] batman_adv: batadv0: Adding interface: veth37 [ 1051.408402][ T7282] batman_adv: batadv0: The MTU of interface veth37 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1051.434393][ T7282] batman_adv: batadv0: Not using interface veth37 (retrying later): interface not active [ 1051.448282][ T7283] batman_adv: batadv0: Adding interface: veth41 [ 1051.455177][ T7283] batman_adv: batadv0: The MTU of interface veth41 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1051.487236][ T7283] batman_adv: batadv0: Not using interface veth41 (retrying later): interface not active [ 1051.556904][ T7284] 8021q: adding VLAN 0 to HW filter on device @ [ 1051.583033][ T7281] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1051.598243][ T8044] device bridge_slave_1 left promiscuous mode [ 1051.614796][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1051.672809][ T8044] device bridge_slave_0 left promiscuous mode [ 1051.682336][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1051.768887][ T8044] device veth1_vlan left promiscuous mode [ 1051.784644][ T8044] device veth0_vlan left promiscuous mode [ 1052.982304][ T8044] device hsr_slave_0 left promiscuous mode [ 1053.032234][ T8044] device hsr_slave_1 left promiscuous mode [ 1053.078354][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1053.089054][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1053.099690][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1053.126067][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1053.194361][ T8044] bond0 (unregistering): Released all slaves [ 1053.300752][ T7290] IPVS: ftp: loaded support on port[0] = 21 [ 1053.450045][ T7290] chnl_net:caif_netlink_parms(): no params data found [ 1053.483845][ T7290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1053.491028][ T7290] bridge0: port 1(bridge_slave_0) entered disabled state [ 1053.499365][ T7290] device bridge_slave_0 entered promiscuous mode [ 1053.507546][ T7290] bridge0: port 2(bridge_slave_1) entered blocking state [ 1053.511648][ T7294] IPVS: ftp: loaded support on port[0] = 21 [ 1053.515022][ T7290] bridge0: port 2(bridge_slave_1) entered disabled state [ 1053.528836][ T7290] device bridge_slave_1 entered promiscuous mode [ 1053.572708][ T7290] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1053.600485][ T7290] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1053.661426][ T7290] team0: Port device team_slave_0 added [ 1053.668533][ T7290] team0: Port device team_slave_1 added [ 1053.754772][ T7290] device hsr_slave_0 entered promiscuous mode [ 1053.842848][ T7290] device hsr_slave_1 entered promiscuous mode [ 1053.882158][ T7290] debugfs: Directory 'hsr0' with parent '/' already present! [ 1053.906319][ T7294] chnl_net:caif_netlink_parms(): no params data found [ 1053.950677][ T7294] bridge0: port 1(bridge_slave_0) entered blocking state [ 1053.958262][ T7294] bridge0: port 1(bridge_slave_0) entered disabled state [ 1053.966490][ T7294] device bridge_slave_0 entered promiscuous mode [ 1053.974460][ T7294] bridge0: port 2(bridge_slave_1) entered blocking state [ 1053.981571][ T7294] bridge0: port 2(bridge_slave_1) entered disabled state [ 1053.989569][ T7294] device bridge_slave_1 entered promiscuous mode [ 1054.009162][ T7294] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1054.020295][ T7294] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1054.041448][ T7290] bridge0: port 2(bridge_slave_1) entered blocking state [ 1054.048611][ T7290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1054.055977][ T7290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1054.063144][ T7290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1054.072459][ T7294] team0: Port device team_slave_0 added [ 1054.081820][ T7294] team0: Port device team_slave_1 added [ 1054.154612][ T7294] device hsr_slave_0 entered promiscuous mode [ 1054.192530][ T7294] device hsr_slave_1 entered promiscuous mode [ 1054.232206][ T7294] debugfs: Directory 'hsr0' with parent '/' already present! [ 1054.265415][ T7294] bridge0: port 2(bridge_slave_1) entered blocking state [ 1054.272549][ T7294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1054.279935][ T7294] bridge0: port 1(bridge_slave_0) entered blocking state [ 1054.286994][ T7294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1054.307731][ T7290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1054.333493][ T7993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1054.341880][ T7993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1054.353473][ T7993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1054.361395][ T7993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1054.378607][ T7290] 8021q: adding VLAN 0 to HW filter on device team0 [ 1054.388343][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1054.396683][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1054.410619][ T7294] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1054.419993][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1054.429436][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1054.438106][ T5751] bridge0: port 1(bridge_slave_0) entered blocking state [ 1054.445236][ T5751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1054.468174][ T7294] 8021q: adding VLAN 0 to HW filter on device team0 [ 1054.475779][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1054.484337][ T8044] tipc: TX() has been purged, node left! [ 1054.485173][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1054.499264][ T6071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1054.506395][ T6071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1054.514555][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1054.524079][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1054.533376][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1054.541789][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1054.550446][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1054.559294][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1054.568402][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1054.576411][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1054.584486][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1054.658813][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1054.667605][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1054.676291][ T5751] bridge0: port 1(bridge_slave_0) entered blocking state [ 1054.683347][ T5751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1054.691320][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1054.700172][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1054.708725][ T5751] bridge0: port 2(bridge_slave_1) entered blocking state [ 1054.715816][ T5751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1054.724127][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1054.733223][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1054.742174][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1054.750700][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1054.759588][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1054.768231][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1054.777256][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1054.819173][ T7290] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1054.830418][ T7290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1054.838482][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1054.847173][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1054.856286][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1054.865130][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1054.907097][ T7294] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1054.917895][ T7294] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1054.931020][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1054.940262][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1054.949159][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1054.957597][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1054.966301][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1055.013180][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1055.020944][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1055.028909][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1055.037042][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1055.049365][ T7294] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1055.059079][ T7290] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1055.138912][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1055.147841][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1055.193393][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1055.201961][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1055.211038][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1055.219169][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1055.227710][ T7294] device veth0_vlan entered promiscuous mode [ 1055.268396][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1055.277369][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1055.287077][ T7294] device veth1_vlan entered promiscuous mode [ 1055.329108][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1055.337658][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1055.346171][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1055.355833][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1055.364144][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1055.402656][ T7290] device veth0_vlan entered promiscuous mode [ 1055.413058][ T7290] device veth1_vlan entered promiscuous mode [ 1055.424783][ T8044] device bridge_slave_1 left promiscuous mode [ 1055.430973][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1055.453136][ T8044] device bridge_slave_0 left promiscuous mode [ 1055.459397][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1055.495746][ T8044] device veth1_vlan left promiscuous mode [ 1055.501506][ T8044] device veth0_vlan left promiscuous mode [ 1056.382514][ T8044] device hsr_slave_0 left promiscuous mode [ 1056.432192][ T8044] device hsr_slave_1 left promiscuous mode [ 1056.498108][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1056.508748][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1056.518704][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1056.556199][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1056.634851][ T8044] bond0 (unregistering): Released all slaves 08:40:22 executing program 4: fstat(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250209000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x258800, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000480)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4}}, &(0x7f0000000580)=0xe8) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000005c0)={r6, @loopback, @loopback}, 0xc) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r8 = socket$unix(0x1, 0x2, 0x0) r9 = socket$unix(0x1, 0x1, 0x0) dup2(r9, r8) sendmsg$unix(r9, &(0x7f00000003c0)={&(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000340)="b4ab448f1a14746307", 0x9}], 0x1, 0x0, 0x0, 0x40000}, 0x840) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r11 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f0000000240)={'vxcan0\x00', r6}) 08:40:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8100, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:22 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1056.975856][ T7317] batman_adv: batadv0: Adding interface: veth45 [ 1056.988857][ T7317] batman_adv: batadv0: The MTU of interface veth45 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1057.022113][ T7317] batman_adv: batadv0: Not using interface veth45 (retrying later): interface not active [ 1057.115762][ T7322] batman_adv: batadv0: Adding interface: veth39 [ 1057.123811][ T7322] batman_adv: batadv0: The MTU of interface veth39 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1057.150117][ T7322] batman_adv: batadv0: Not using interface veth39 (retrying later): interface not active 08:40:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7c07f, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1057.170613][ T7323] 8021q: adding VLAN 0 to HW filter on device @ [ 1057.326804][ T7319] batman_adv: batadv0: Adding interface: veth29 [ 1057.333194][ T7319] batman_adv: batadv0: The MTU of interface veth29 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1057.361399][ T7319] batman_adv: batadv0: Not using interface veth29 (retrying later): interface not active 08:40:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa00, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1057.487607][ T7331] batman_adv: batadv0: Adding interface: veth47 [ 1057.516842][ T7331] batman_adv: batadv0: The MTU of interface veth47 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250309000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:23 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:23 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1057.637039][ T7331] batman_adv: batadv0: Not using interface veth47 (retrying later): interface not active 08:40:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7c080, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000140)=0x9) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700008e19044873d0dcf8f897f39121cc0d369b1e11bfb6acd0c2411d09cb264e39f8d7fc0721f6a81514ff06712810b32b1f84628f56c4f10f3106609d1154d268d8d143022058f8b158e878d37d0bc682568b38ea3ab903cde0ea72e427", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:23 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:23 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1057.836280][ T7340] device @ entered promiscuous mode [ 1057.855821][ T7340] device team_slave_0 entered promiscuous mode [ 1057.890541][ T7340] device team_slave_1 entered promiscuous mode [ 1057.916933][ T7340] 8021q: adding VLAN 0 to HW filter on device @ [ 1057.927007][ T7339] batman_adv: batadv0: Adding interface: veth41 [ 1057.939741][ T7339] batman_adv: batadv0: The MTU of interface veth41 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1057.971200][ T7339] batman_adv: batadv0: Not using interface veth41 (retrying later): interface not active [ 1058.009635][ T7348] batman_adv: batadv0: Adding interface: veth49 [ 1058.031385][ T7348] batman_adv: batadv0: The MTU of interface veth49 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc00, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$unix(0x1, 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) dup2(r5, r4) r6 = socket$unix(0x1, 0x2, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffed0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="624e72ef63d18951ba2b19bfc73e5fe077143b66205a7ed52cb9b1fba85af7e13d4759d50f8c3672b2f5c5b0d70a1665f44d3a35249f80febdc82d588a545c3ec79c9be49423883a3bb1b67376949854cebb10d6e7e8d32ee8362cea086d9c7bab5efcb6956e3f562aa4d736eaebb8d49aeade7b098cc4e271ed83a94f76a7f095cacd72add7a0eb71cc514ffcad7bef7d17dc9bb9f75c5785beceb1d54bd4b500fffe0965a0a64a2bb1e908e82db8c41446b8a8cc506c1561668be0e895d1a31bd55e20e2e79cd5f4822069760fe8589beae0cdd52f2738d72b945e2da027f71fbe679548bb70a894053735f10d14", @ANYRES32, @ANYRES64=r4, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESOCT=r8, @ANYRES64, @ANYRES64, @ANYRESDEC=0x0, @ANYRES32=r3, @ANYRES32=r1]], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1058.139596][ T7348] batman_adv: batadv0: Not using interface veth49 (retrying later): interface not active [ 1058.303973][ T7349] 8021q: adding VLAN 0 to HW filter on device @ [ 1058.340855][ T7357] batman_adv: batadv0: Adding interface: veth43 [ 1058.362729][ T7357] batman_adv: batadv0: The MTU of interface veth43 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250409000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1058.415881][ T7357] batman_adv: batadv0: Not using interface veth43 (retrying later): interface not active [ 1058.472400][ T7359] batman_adv: batadv0: Adding interface: veth31 [ 1058.495387][ T7359] batman_adv: batadv0: The MTU of interface veth31 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7c081, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1058.549039][ T7359] batman_adv: batadv0: Not using interface veth31 (retrying later): interface not active [ 1058.716882][ T7363] 8021q: adding VLAN 0 to HW filter on device @ 08:40:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe00, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="000015bf78a8ab11cbaed46c873f5358"], 0x28}}, 0x0) [ 1058.877504][ T7367] batman_adv: batadv0: Adding interface: veth51 [ 1058.897485][ T7367] batman_adv: batadv0: The MTU of interface veth51 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1058.962166][ T7367] batman_adv: batadv0: Not using interface veth51 (retrying later): interface not active [ 1058.987173][ T7368] 8021q: adding VLAN 0 to HW filter on device @ [ 1059.020871][ T7375] batman_adv: batadv0: Adding interface: veth45 [ 1059.027430][ T7375] batman_adv: batadv0: The MTU of interface veth45 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1059.060108][ T7375] batman_adv: batadv0: Not using interface veth45 (retrying later): interface not active 08:40:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250509000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1059.078068][ T7376] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1059.128321][ T7378] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 08:40:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) shmget$private(0x0, 0x1000, 0x40, &(0x7f0000ffc000/0x1000)=nil) [ 1059.439349][ T7383] 8021q: adding VLAN 0 to HW filter on device @ [ 1059.491270][ T7390] batman_adv: batadv0: Adding interface: veth53 [ 1059.505598][ T7390] batman_adv: batadv0: The MTU of interface veth53 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1059.542115][ T7390] batman_adv: batadv0: Not using interface veth53 (retrying later): interface not active [ 1059.594346][ T7394] batman_adv: batadv0: Adding interface: veth47 [ 1059.620881][ T7394] batman_adv: batadv0: The MTU of interface veth47 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1059.683761][ T7394] batman_adv: batadv0: Not using interface veth47 (retrying later): interface not active [ 1059.702924][ T8044] tipc: TX() has been purged, node left! [ 1059.710064][ T8044] tipc: TX() has been purged, node left! [ 1059.716410][ T7395] batman_adv: batadv0: Adding interface: veth37 [ 1059.725854][ T7395] batman_adv: batadv0: The MTU of interface veth37 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1059.780040][ T7395] batman_adv: batadv0: Not using interface veth37 (retrying later): interface not active [ 1060.228716][ T7403] IPVS: ftp: loaded support on port[0] = 21 [ 1060.378370][ T7403] chnl_net:caif_netlink_parms(): no params data found [ 1060.456694][ T7403] bridge0: port 1(bridge_slave_0) entered blocking state [ 1060.463991][ T7403] bridge0: port 1(bridge_slave_0) entered disabled state [ 1060.471667][ T7403] device bridge_slave_0 entered promiscuous mode [ 1060.479400][ T7403] bridge0: port 2(bridge_slave_1) entered blocking state [ 1060.486639][ T7403] bridge0: port 2(bridge_slave_1) entered disabled state [ 1060.495077][ T7403] device bridge_slave_1 entered promiscuous mode [ 1060.557481][ T7403] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1060.568770][ T7403] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1060.637978][ T7403] team0: Port device team_slave_0 added [ 1060.645212][ T7403] team0: Port device team_slave_1 added [ 1060.714248][ T7403] device hsr_slave_0 entered promiscuous mode [ 1060.762510][ T7403] device hsr_slave_1 entered promiscuous mode [ 1060.822160][ T7403] debugfs: Directory 'hsr0' with parent '/' already present! [ 1060.893319][ T7403] bridge0: port 2(bridge_slave_1) entered blocking state [ 1060.900362][ T7403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1060.907752][ T7403] bridge0: port 1(bridge_slave_0) entered blocking state [ 1060.914871][ T7403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1061.024960][ T8044] device bridge_slave_1 left promiscuous mode [ 1061.031156][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.073063][ T8044] device bridge_slave_0 left promiscuous mode [ 1061.079282][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1061.125444][ T8044] device bridge_slave_1 left promiscuous mode [ 1061.131606][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.183543][ T8044] device bridge_slave_0 left promiscuous mode [ 1061.189728][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1061.236998][ T8044] device veth1_vlan left promiscuous mode [ 1061.242794][ T8044] device veth0_vlan left promiscuous mode [ 1061.248720][ T8044] device veth1_vlan left promiscuous mode [ 1061.254481][ T8044] device veth0_vlan left promiscuous mode [ 1062.892516][ T8044] device hsr_slave_0 left promiscuous mode [ 1062.932292][ T8044] device hsr_slave_1 left promiscuous mode [ 1062.987950][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1062.998126][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1063.008440][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1063.036226][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1063.114310][ T8044] bond0 (unregistering): Released all slaves [ 1063.312351][ T8044] device hsr_slave_0 left promiscuous mode [ 1063.352141][ T8044] device hsr_slave_1 left promiscuous mode [ 1063.398495][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1063.409463][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1063.419399][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1063.475737][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1063.535000][ T8044] bond0 (unregistering): Released all slaves [ 1063.632712][ T7403] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1063.642290][ T6071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1063.650139][ T6071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1063.666753][ T7406] IPVS: ftp: loaded support on port[0] = 21 [ 1063.681621][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1063.689867][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1063.705058][ T7403] 8021q: adding VLAN 0 to HW filter on device team0 [ 1063.720317][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1063.729170][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1063.737749][ T6129] bridge0: port 1(bridge_slave_0) entered blocking state [ 1063.744779][ T6129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1063.768550][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1063.777673][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1063.786163][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1063.793311][ T8003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1063.801202][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1063.810312][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1063.833888][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1063.846734][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1063.855467][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1063.864471][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1063.873245][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1063.881588][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1063.890030][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1063.898355][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1063.975769][ T7403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1063.983942][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1064.027861][ T7406] chnl_net:caif_netlink_parms(): no params data found [ 1064.068029][ T7406] bridge0: port 1(bridge_slave_0) entered blocking state [ 1064.076456][ T7406] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.086450][ T7406] device bridge_slave_0 entered promiscuous mode [ 1064.095964][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1064.112288][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1064.120778][ T7406] bridge0: port 2(bridge_slave_1) entered blocking state [ 1064.129665][ T7406] bridge0: port 2(bridge_slave_1) entered disabled state [ 1064.138825][ T7406] device bridge_slave_1 entered promiscuous mode [ 1064.161506][ T7406] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1064.178258][ T7403] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1064.196731][ T7406] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1064.226630][ T7406] team0: Port device team_slave_0 added [ 1064.246689][ T7406] team0: Port device team_slave_1 added [ 1064.334783][ T7406] device hsr_slave_0 entered promiscuous mode [ 1064.392509][ T7406] device hsr_slave_1 entered promiscuous mode [ 1064.432099][ T7406] debugfs: Directory 'hsr0' with parent '/' already present! [ 1064.483769][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1064.493073][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1064.524919][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1064.542760][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1064.554651][ T7403] device veth0_vlan entered promiscuous mode [ 1064.577099][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1064.592861][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1064.605518][ T7403] device veth1_vlan entered promiscuous mode [ 1064.643932][ T7406] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1064.652910][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1064.661160][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1064.702434][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1064.710617][ T6129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1064.720512][ T7406] 8021q: adding VLAN 0 to HW filter on device team0 [ 1064.741950][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1064.751679][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1064.760512][ T7993] bridge0: port 1(bridge_slave_0) entered blocking state [ 1064.767570][ T7993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1064.789052][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:40:30 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1064.802471][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1064.811269][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1064.824380][ T7993] bridge0: port 2(bridge_slave_1) entered blocking state [ 1064.831432][ T7993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1064.843300][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1064.856642][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1064.869362][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1064.880732][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1064.895208][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1064.905813][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1064.915752][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1064.924702][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1064.936707][ T7406] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1064.948813][ T7406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1064.964150][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1064.982859][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1064.991451][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1065.025667][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1065.033526][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1065.047139][ T7406] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1065.114448][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1065.123692][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1065.136950][ T7406] device veth0_vlan entered promiscuous mode [ 1065.144743][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1065.153284][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1065.165672][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1065.173784][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1065.184828][ T7406] device veth1_vlan entered promiscuous mode 08:40:31 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250609000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3f00, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x0, 0x0) statx(r4, &(0x7f0000000600)='./file0\x00', 0x1000, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x4, &(0x7f0000000580)=[{&(0x7f00000012c0), 0x0, 0x1f}, {&(0x7f00000002c0)="fb05613d93c3fa64c80e2c816eb7842295664f9c55a21fadd572a784335c2bdfadd1844cb9cf9b5eecf2eee8b1efb924359e702cd3b72a9d719b955f02cc4a067abadb2f2bdf7456b321bdd347658f6d2d1f4a52bb9aa6cd3ef8e43f496c3e164278c91ec3e891f387127e6e615dc474cf01b21048615f7d689c25a2382e31c7c6569ecaff93822c90114c479d36cc1cf6d0bc43f8129e0d65f89061436f6363e4c27c1dd0e96b36bb541c", 0xab, 0x7}, {&(0x7f00000003c0)="8b440d81d69825c9f6b79e92c950dce383876b003e1021de345e98e32a7607da5a8ad4c0894867257416ebc4876e73310675693404bf8e82694e0f21c5a2dbc20b822e0b66d9b1f1258f0ea17db059591ce2159efbb9a5f8ac346717f4c43fc242256264dc05bf938c48e0a8ce6d310f7ba6e13a97f7d60550a1fe00e203eda4593f71dea1", 0x85, 0x10000}, {&(0x7f0000000480)="0e30f034e2ac9b15a55b34531d8756643f95b58fcc18ef3c748bb81c8c3f7df266e9cafc34c0d7c3062131cd204d54da5ddb9d85a14258f21413e03f536cae0a8be413e454d273df2d83e16af09b4d809b147f805cce48b9d5fb096ae2c542377ebfa6be043072d19e4652f21a50d8142983e0571533a239c7c2057d167d73d2542866c403f069e6922854d5a46cf86470b62bf3c15fb9460238b6c653d92ff247975ec6f0e4f28e26755bee", 0xac, 0x1}], 0x80000, &(0x7f0000000740)={[{@fat=@errors_remount='errors=remount-ro'}, {@fat=@uid={'uid', 0x3d, r5}}, {@fat=@errors_remount='errors=remount-ro'}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'user_u'}}]}) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x42000) r7 = getegid() fcntl$getownex(r6, 0x10, &(0x7f0000000a80)={0x0, 0x0}) lstat(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x1) lstat(0x0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r11, 0x0, r12) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000300)}, {&(0x7f00000003c0)="461b173c1daf6fd3514b07e58b123ee40c55eb9586082bf98076ed45f0a0344a8b3366c25b10c962569d34684addf1078c3af1132a862f36a4917c2b837f86361a1bfcf81b8859a44fa1a3aaecc79b2c8c0537df9ff0d2322077077298d6ad2bb54b8200", 0x64}, {&(0x7f00000005c0)="2919da6b1a29b57e129b7a4a60afbb", 0xf}, {0x0}, {&(0x7f0000000700)="8e01364aa70818cbf626a37fcfa2270baff3d5e2cb6b0bada6c69f072980e53f814ae0e21a482618037c48c5912a9f3f77946116a4ed98", 0x37}], 0x5, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r8, 0x0, r9}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r10, r12}}}], 0xa0, 0x4}, 0x6010) fchown(0xffffffffffffffff, r5, r9) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000480)=@urb_type_iso={0x0, {0x5, 0x1}, 0x9, 0x24, &(0x7f00000002c0)="a6ae8ac14f0e7350f2c14f932c9aec3d3e07cebf9200e1c4da17f68121c6f0f02c7341cbf0bec948ea6941e1483d1994d89e0fcbd4490b6c87e8d53f923de61373021892f6dbf789f0", 0x49, 0x33, 0x9, 0x76, 0x3, 0x4, &(0x7f0000000140)="49484de51a575559e4eb2358e5385189705cddb4e107fa296efd", [{0x281, 0x5, 0x7f}, {0xffffffff, 0x8000, 0x8}, {0x5, 0x7fffffff, 0x18}, {0x3, 0x3, 0x7}, {0x2, 0x1000, 0x1}, {0x3f, 0xfffffffe, 0x401}, {0x7, 0x10000000, 0x8}, {0x5e6, 0x2, 0x9}, {0x1, 0x6, 0xffffff80}, {0x4, 0x1, 0xf1}, {0x2, 0x800, 0x2}, {0x1, 0xfffffffc, 0x3}, {0x80, 0x9}, {0x7f, 0x1, 0x6}, {0x7, 0x800, 0x1}, {0x10001, 0x8, 0x8}, {0x1, 0x3, 0x80}, {0x10000, 0x7, 0xe5cc}, {0x7, 0x1ff}, {0x8, 0x10000, 0x4}, {0x10001, 0x5, 0x5}, {0xfffffffa, 0xffffffff, 0x9}, {0xff, 0x41, 0x26}, {0x2, 0x7ff, 0x30f}, {0x0, 0xff}, {0x1ff, 0xfffffe00, 0x401}, {0x7, 0xfffffff9, 0x642}, {0x2708, 0x0, 0x40}, {0x9, 0x3, 0x5}, {0x1eafb18d, 0x8001}, {0x21, 0x7fff, 0xed}, {0x80000001, 0x7, 0x2}, {0x5, 0x8, 0x8}, {0x5, 0x29, 0x9}, {0x6, 0x7, 0x3}, {0x0, 0x2, 0x10001}, {0x3f, 0x11, 0x3}, {0x4, 0x4, 0x5}, {0x5, 0x1000, 0x8}, {0x3, 0xdfa5463e, 0x1000}, {0x3, 0x3, 0x81}, {0x1, 0x3, 0x4}, {0xfd1, 0x7, 0x9}, {0xfff, 0x8, 0x3}, {0x409, 0x800, 0x4}, {0x6, 0xffffffff, 0xffff}, {0x0, 0x2, 0x8}, {0x401, 0xfeae}, {0x4, 0x1000, 0x6}, {0x7fffffff, 0x20, 0xff}, {0x5, 0x7fff, 0x28}, {0x7a34, 0x29dcb00, 0x6}, {0x5, 0xa92, 0x7fff}, {0x400, 0x3, 0x1d3}, {0x4, 0x2, 0x1ff}, {0x9, 0x620e, 0x879}, {0x2, 0x1000, 0xfff}, {0xfffffffa, 0x8bc8, 0x9}, {0x101, 0x8}, {0x9, 0x4, 0x8}, {0x10000, 0x2, 0x3e0000}, {0x5, 0x1ff, 0x5}, {0x8, 0x7}, {0x5, 0x80000000, 0x8}, {0x4, 0x2, 0x800}, {0x80000000, 0x7fffffff, 0x1000}, {0xd472341, 0x80, 0x88d}, {0xffff40c0, 0x3, 0x10000}, {0x1000, 0x9, 0x9}, {0x10000, 0x7, 0x41d4}, {0x10001, 0x5, 0x9}, {0xfffffffb, 0x7, 0x6}, {0x5, 0x5, 0x1}, {0x3ff, 0x2, 0x80000001}, {0xd27, 0x2, 0x6}, {0x0, 0x2, 0x1}, {0x80, 0x68}, {0x1f, 0x9b, 0x5}, {0xaf8, 0x8, 0xfff}, {0x2, 0x2, 0x10001}, {0x1ff, 0x5, 0x8}, {0x909, 0x1}, {0x6, 0x4, 0x101}, {0x5, 0x3f, 0x3}, {0x100, 0x7fffffff, 0x4}, {0x3c44, 0x8, 0xd2fd}, {0x0, 0x7fff, 0x5}, {0x80000000, 0x4, 0xe0000000}, {0x3, 0x0, 0x8}, {0x4, 0x5, 0x400}, {0xdb, 0x7, 0x9}, {0x1, 0x0, 0x9}, {0x401, 0x5, 0x1f}, {0x9, 0x7}, {0x1, 0x1, 0x1}, {0x7ff, 0x3, 0xf059}, {0x3, 0x576, 0x5}, {0x1, 0xfff, 0x5}, {0xfffffffd, 0x6, 0x347cdd50}, {0x3, 0x401, 0x3}, {0x3, 0x5ba2, 0x5}, {0x8, 0x6, 0x8}, {0x4, 0x4, 0x1}, {0x40, 0x2, 0x8}, {0x2850, 0xfff, 0x8462}, {0x9, 0x5, 0x6}, {0x5, 0x7fff, 0x5}, {0x5, 0x1, 0x975}, {0x401, 0x6, 0x4}, {0xffffffff, 0xe47, 0x7}, {0x10000, 0x1ff, 0x6d7a}, {0xfffffffb, 0x80000001, 0x5}, {0xfff, 0x5, 0x1}, {0x1, 0x5, 0x7a21}, {0x4, 0x3ff, 0x9}, {0x40, 0xda58, 0x1}, {0x3f, 0x6}, {0x8, 0x8, 0x20}]}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:31 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1065.478511][ T7447] batman_adv: batadv0: Adding interface: veth55 [ 1065.485104][ T7447] batman_adv: batadv0: The MTU of interface veth55 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1065.510372][ T7447] batman_adv: batadv0: Not using interface veth55 (retrying later): interface not active 08:40:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:31 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1065.600440][ T7450] 8021q: adding VLAN 0 to HW filter on device @ [ 1065.614761][ T7449] batman_adv: batadv0: Adding interface: veth49 [ 1065.621309][ T7449] batman_adv: batadv0: The MTU of interface veth49 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:31 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1065.809113][ T7449] batman_adv: batadv0: Not using interface veth49 (retrying later): interface not active [ 1065.826917][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1065.851194][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1065.889731][ T7466] 8021q: adding VLAN 0 to HW filter on device @ 08:40:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250709000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1065.967418][ T7469] batman_adv: batadv0: Adding interface: veth57 [ 1065.991456][ T7469] batman_adv: batadv0: The MTU of interface veth57 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1066.017221][ T7469] batman_adv: batadv0: Not using interface veth57 (retrying later): interface not active [ 1066.031936][ T7459] batman_adv: batadv0: Adding interface: veth39 [ 1066.058537][ T7459] batman_adv: batadv0: The MTU of interface veth39 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1066.152546][ T7459] batman_adv: batadv0: Not using interface veth39 (retrying later): interface not active 08:40:31 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1066.211239][ T7490] 8021q: adding VLAN 0 to HW filter on device @ 08:40:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1066.260380][ T7490] 8021q: adding VLAN 0 to HW filter on device @ 08:40:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250809000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000140), &(0x7f0000000240)=0xc) [ 1066.453395][ T7503] batman_adv: batadv0: Adding interface: veth53 [ 1066.497435][ T7503] batman_adv: batadv0: The MTU of interface veth53 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1066.552107][ T7503] batman_adv: batadv0: Not using interface veth53 (retrying later): interface not active [ 1066.573159][ T7504] batman_adv: batadv0: Adding interface: veth59 08:40:32 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1066.590881][ T7504] batman_adv: batadv0: The MTU of interface veth59 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1066.632099][ T7504] batman_adv: batadv0: Not using interface veth59 (retrying later): interface not active 08:40:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4800, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1066.815451][ T7517] batman_adv: batadv0: Adding interface: veth41 [ 1066.834070][ T7517] batman_adv: batadv0: The MTU of interface veth41 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1066.859865][ T8044] tipc: TX() has been purged, node left! 08:40:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:32 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1066.957761][ T7517] batman_adv: batadv0: Not using interface veth41 (retrying later): interface not active [ 1066.974403][ T7519] 8021q: adding VLAN 0 to HW filter on device @ 08:40:32 executing program 0: fstat(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1067.136995][ T7533] batman_adv: batadv0: Adding interface: veth55 [ 1067.151082][ T7533] batman_adv: batadv0: The MTU of interface veth55 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1067.212296][ T7533] batman_adv: batadv0: Not using interface veth55 (retrying later): interface not active [ 1067.247948][ T7519] 8021q: adding VLAN 0 to HW filter on device @ 08:40:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1067.270317][ T7532] batman_adv: batadv0: Adding interface: veth61 [ 1067.282205][ T7532] batman_adv: batadv0: The MTU of interface veth61 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250a09000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:33 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1067.413258][ T7532] batman_adv: batadv0: Not using interface veth61 (retrying later): interface not active 08:40:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1067.612008][ T7549] batman_adv: batadv0: Adding interface: veth43 [ 1067.634236][ T7549] batman_adv: batadv0: The MTU of interface veth43 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4c00, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1067.667104][ T7549] batman_adv: batadv0: Not using interface veth43 (retrying later): interface not active [ 1067.708104][ T7551] 8021q: adding VLAN 0 to HW filter on device @ 08:40:33 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1067.885285][ T7561] 8021q: adding VLAN 0 to HW filter on device @ [ 1067.928953][ T7566] batman_adv: batadv0: Adding interface: veth63 [ 1067.942554][ T7566] batman_adv: batadv0: The MTU of interface veth63 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250c09000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf64(r6, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x3, 0x7, 0x1, 0x101, 0xb7461d4990155aa6, 0xdbc658af6c01a0a5, 0x200, 0x168, 0x40, 0x19, 0x4, 0x0, 0x38, 0x1, 0x80, 0x4, 0x7}, [{0x1, 0x68433e9d, 0x0, 0x1, 0x7ff, 0x5, 0x7ff, 0x1}], "87419ca1acfe8e839165359ddab1f5756e9ff48ad7bf010f95f91bdcf6b0b58dd85c5f7d879bbef5de812c6b387288ba49389cb903eb208761addf70eafae484a419cc", [[], [], [], [], [], []]}, 0x6bb) [ 1068.048767][ T7566] batman_adv: batadv0: Not using interface veth63 (retrying later): interface not active [ 1068.091168][ T7567] batman_adv: batadv0: Adding interface: veth57 [ 1068.115084][ T7567] batman_adv: batadv0: The MTU of interface veth57 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:33 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1068.192176][ T7567] batman_adv: batadv0: Not using interface veth57 (retrying later): interface not active 08:40:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1068.326624][ T7578] batman_adv: batadv0: Adding interface: veth45 [ 1068.355349][ T7578] batman_adv: batadv0: The MTU of interface veth45 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5865, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1068.452095][ T7578] batman_adv: batadv0: Not using interface veth45 (retrying later): interface not active [ 1068.470462][ T7577] 8021q: adding VLAN 0 to HW filter on device @ [ 1068.498304][ T7577] 8021q: adding VLAN 0 to HW filter on device @ [ 1068.679901][ T7584] batman_adv: batadv0: Adding interface: veth65 [ 1068.686279][ T7584] batman_adv: batadv0: The MTU of interface veth65 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1068.711551][ T7584] batman_adv: batadv0: Not using interface veth65 (retrying later): interface not active [ 1068.736863][ T7588] batman_adv: batadv0: Adding interface: veth61 [ 1068.743798][ T7588] batman_adv: batadv0: The MTU of interface veth61 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1068.775656][ T7588] batman_adv: batadv0: Not using interface veth61 (retrying later): interface not active [ 1069.134759][ T8044] device bridge_slave_1 left promiscuous mode [ 1069.141027][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1069.202988][ T8044] device bridge_slave_0 left promiscuous mode [ 1069.209234][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1069.275322][ T8044] device veth1_vlan left promiscuous mode [ 1069.281130][ T8044] device veth0_vlan left promiscuous mode [ 1070.212471][ T8044] device hsr_slave_0 left promiscuous mode [ 1070.262197][ T8044] device hsr_slave_1 left promiscuous mode [ 1070.319526][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1070.330332][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1070.340677][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1070.385428][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1070.445105][ T8044] bond0 (unregistering): Released all slaves [ 1070.559273][ T7595] IPVS: ftp: loaded support on port[0] = 21 [ 1070.614555][ T7595] chnl_net:caif_netlink_parms(): no params data found [ 1070.641470][ T7595] bridge0: port 1(bridge_slave_0) entered blocking state [ 1070.648838][ T7595] bridge0: port 1(bridge_slave_0) entered disabled state [ 1070.656846][ T7595] device bridge_slave_0 entered promiscuous mode [ 1070.664509][ T7595] bridge0: port 2(bridge_slave_1) entered blocking state [ 1070.671559][ T7595] bridge0: port 2(bridge_slave_1) entered disabled state [ 1070.679400][ T7595] device bridge_slave_1 entered promiscuous mode [ 1070.740118][ T7595] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1070.751243][ T7595] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1070.771278][ T7595] team0: Port device team_slave_0 added [ 1070.778387][ T7595] team0: Port device team_slave_1 added [ 1070.834670][ T7595] device hsr_slave_0 entered promiscuous mode [ 1070.892456][ T7595] device hsr_slave_1 entered promiscuous mode [ 1070.932135][ T7595] debugfs: Directory 'hsr0' with parent '/' already present! [ 1070.974407][ T7595] bridge0: port 2(bridge_slave_1) entered blocking state [ 1070.981652][ T7595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1070.988944][ T7595] bridge0: port 1(bridge_slave_0) entered blocking state [ 1070.995991][ T7595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1071.039398][ T7595] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1071.057912][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1071.069899][ T5781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1071.078451][ T5781] bridge0: port 2(bridge_slave_1) entered disabled state [ 1071.095843][ T7595] 8021q: adding VLAN 0 to HW filter on device team0 [ 1071.107457][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1071.116354][ T5781] bridge0: port 1(bridge_slave_0) entered blocking state [ 1071.123405][ T5781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1071.143327][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1071.151805][ T5781] bridge0: port 2(bridge_slave_1) entered blocking state [ 1071.158853][ T5781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1071.168647][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1071.177922][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1071.190169][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1071.204128][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1071.212827][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1071.223141][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1071.237080][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1071.244778][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1071.256232][ T7595] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1071.316418][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1071.338172][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1071.347325][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1071.357810][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1071.366779][ T7595] device veth0_vlan entered promiscuous mode [ 1071.378167][ T7595] device veth1_vlan entered promiscuous mode 08:40:37 executing program 0: fstat(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250e09000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r2, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000140)={0x0, 0x0, 0x1, 0x1, {0xffffffff, 0xc1, 0x5}}) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x4000000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:37 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1071.563003][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1071.571142][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1071.672384][ T8044] tipc: TX() has been purged, node left! [ 1071.684072][ T7610] 8021q: adding VLAN 0 to HW filter on device @ [ 1071.735460][ T7617] 8021q: adding VLAN 0 to HW filter on device @ 08:40:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0xfff, 0xfffffffc, 0x9, 0x6, 0xfff, 0xa5, 0x1000, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0xffffffff, 0x4c102c17, 0x81, 0x3f, 0x1}}, &(0x7f0000000240)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000480)={r7, @in6={{0xa, 0x4e21, 0x100, @local, 0x3}}, 0x7, 0xeb9}, 0x90) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') 08:40:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250f09000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1072.050390][ T7613] batman_adv: batadv0: Adding interface: veth69 [ 1072.057932][ T7613] batman_adv: batadv0: The MTU of interface veth69 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1072.102095][ T7613] batman_adv: batadv0: Not using interface veth69 (retrying later): interface not active [ 1072.125787][ T7614] batman_adv: batadv0: Adding interface: veth63 [ 1072.133039][ T7614] batman_adv: batadv0: The MTU of interface veth63 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1072.166646][ T7614] batman_adv: batadv0: Not using interface veth63 (retrying later): interface not active [ 1072.189696][ T7622] batman_adv: batadv0: Adding interface: veth47 08:40:37 executing program 0: fstat(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1072.196247][ T7622] batman_adv: batadv0: The MTU of interface veth47 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1072.224456][ T7622] batman_adv: batadv0: Not using interface veth47 (retrying later): interface not active [ 1072.267888][ T7627] 8021q: adding VLAN 0 to HW filter on device @ 08:40:38 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6558, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getpid() sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb251009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1072.670153][ T7640] batman_adv: batadv0: Adding interface: veth65 [ 1072.678885][ T7640] batman_adv: batadv0: The MTU of interface veth65 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1072.723448][ T7640] batman_adv: batadv0: Not using interface veth65 (retrying later): interface not active [ 1072.759350][ T7642] batman_adv: batadv0: Adding interface: veth49 [ 1072.775995][ T7642] batman_adv: batadv0: The MTU of interface veth49 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1072.802166][ T7642] batman_adv: batadv0: Not using interface veth49 (retrying later): interface not active [ 1072.824136][ T7644] batman_adv: batadv0: Adding interface: veth73 [ 1072.832367][ T7644] batman_adv: batadv0: The MTU of interface veth73 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1072.861349][ T7644] batman_adv: batadv0: Not using interface veth73 (retrying later): interface not active [ 1072.933211][ T7648] 8021q: adding VLAN 0 to HW filter on device @ 08:40:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1073.072873][ T7648] 8021q: adding VLAN 0 to HW filter on device @ [ 1073.219933][ T7651] batman_adv: batadv0: Adding interface: veth75 [ 1073.235891][ T7651] batman_adv: batadv0: The MTU of interface veth75 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1073.282355][ T7651] batman_adv: batadv0: Not using interface veth75 (retrying later): interface not active [ 1073.684572][ T8044] device bridge_slave_1 left promiscuous mode [ 1073.690924][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1073.742624][ T8044] device bridge_slave_0 left promiscuous mode [ 1073.748984][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1073.785316][ T8044] device veth1_vlan left promiscuous mode [ 1073.791295][ T8044] device veth0_vlan left promiscuous mode [ 1074.702482][ T8044] device hsr_slave_0 left promiscuous mode [ 1074.742272][ T8044] device hsr_slave_1 left promiscuous mode [ 1074.792480][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1074.809901][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1074.819876][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1074.846330][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1074.923818][ T8044] bond0 (unregistering): Released all slaves [ 1075.059580][ T7659] IPVS: ftp: loaded support on port[0] = 21 [ 1075.071799][ T7661] IPVS: ftp: loaded support on port[0] = 21 [ 1075.211130][ T7659] chnl_net:caif_netlink_parms(): no params data found [ 1075.247668][ T7661] chnl_net:caif_netlink_parms(): no params data found [ 1075.299231][ T7659] bridge0: port 1(bridge_slave_0) entered blocking state [ 1075.309391][ T7659] bridge0: port 1(bridge_slave_0) entered disabled state [ 1075.318160][ T7659] device bridge_slave_0 entered promiscuous mode [ 1075.341289][ T7661] bridge0: port 1(bridge_slave_0) entered blocking state [ 1075.352547][ T7661] bridge0: port 1(bridge_slave_0) entered disabled state [ 1075.360394][ T7661] device bridge_slave_0 entered promiscuous mode [ 1075.375946][ T7659] bridge0: port 2(bridge_slave_1) entered blocking state [ 1075.392138][ T7659] bridge0: port 2(bridge_slave_1) entered disabled state [ 1075.400127][ T7659] device bridge_slave_1 entered promiscuous mode [ 1075.417821][ T7661] bridge0: port 2(bridge_slave_1) entered blocking state [ 1075.428865][ T7661] bridge0: port 2(bridge_slave_1) entered disabled state [ 1075.437152][ T7661] device bridge_slave_1 entered promiscuous mode [ 1075.456622][ T7659] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1075.486251][ T7659] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1075.498042][ T7661] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1075.509897][ T7661] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1075.540570][ T7661] team0: Port device team_slave_0 added [ 1075.551272][ T7661] team0: Port device team_slave_1 added [ 1075.563729][ T7659] team0: Port device team_slave_0 added [ 1075.585349][ T7659] team0: Port device team_slave_1 added [ 1075.664446][ T7661] device hsr_slave_0 entered promiscuous mode [ 1075.702622][ T7661] device hsr_slave_1 entered promiscuous mode [ 1075.772120][ T7661] debugfs: Directory 'hsr0' with parent '/' already present! [ 1075.844801][ T7659] device hsr_slave_0 entered promiscuous mode [ 1075.902571][ T7659] device hsr_slave_1 entered promiscuous mode [ 1075.952201][ T7659] debugfs: Directory 'hsr0' with parent '/' already present! [ 1075.990408][ T7661] bridge0: port 2(bridge_slave_1) entered blocking state [ 1075.997504][ T7661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1076.005099][ T7661] bridge0: port 1(bridge_slave_0) entered blocking state [ 1076.012149][ T7661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1076.032920][ T7659] bridge0: port 2(bridge_slave_1) entered blocking state [ 1076.039991][ T7659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1076.047370][ T7659] bridge0: port 1(bridge_slave_0) entered blocking state [ 1076.054455][ T7659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1076.087560][ T5781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1076.095711][ T5781] bridge0: port 2(bridge_slave_1) entered disabled state [ 1076.113031][ T5781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1076.132230][ T5781] bridge0: port 2(bridge_slave_1) entered disabled state [ 1076.170414][ T7661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1076.184410][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1076.192525][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1076.202593][ T7661] 8021q: adding VLAN 0 to HW filter on device team0 [ 1076.220174][ T7659] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1076.227408][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1076.236289][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1076.245184][T28449] bridge0: port 1(bridge_slave_0) entered blocking state [ 1076.252237][T28449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1076.267343][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1076.276088][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1076.285067][ T6080] bridge0: port 2(bridge_slave_1) entered blocking state [ 1076.292129][ T6080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1076.317308][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1076.326605][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1076.336185][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1076.345179][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1076.354229][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1076.362971][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1076.371650][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1076.380232][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1076.388745][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1076.397400][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1076.406134][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1076.414267][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1076.423687][ T7661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1076.434477][ T7659] 8021q: adding VLAN 0 to HW filter on device team0 [ 1076.446041][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1076.458065][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1076.467443][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1076.476024][ T6071] bridge0: port 1(bridge_slave_0) entered blocking state [ 1076.483100][ T6071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1076.503018][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1076.512424][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1076.522302][T28449] bridge0: port 2(bridge_slave_1) entered blocking state [ 1076.529333][T28449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1076.538170][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1076.556962][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1076.566017][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1076.574187][ T8044] tipc: TX() has been purged, node left! [ 1076.574214][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1076.587577][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1076.596692][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1076.606566][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1076.615144][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1076.624839][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1076.633482][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1076.641937][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1076.654547][ T7659] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1076.666290][ T7659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1076.720518][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1076.729197][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1076.744404][ T7661] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1076.789909][ T7659] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1076.798055][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1076.809891][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1076.862233][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1076.870882][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1076.895565][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1076.904090][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1076.913003][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1076.920800][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1076.962238][ T7661] device veth0_vlan entered promiscuous mode [ 1076.975758][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1076.984951][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1077.022765][ T7661] device veth1_vlan entered promiscuous mode [ 1077.044672][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1077.053170][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1077.061557][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1077.070078][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1077.124339][ T7659] device veth0_vlan entered promiscuous mode [ 1077.131640][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1077.143370][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1077.155719][ T7659] device veth1_vlan entered promiscuous mode 08:40:43 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000240)={0x5, 0xd5}) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$unix(0x1, 0x2, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) dup2(r6, r5) r7 = socket$unix(0x1, 0x2, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$unix(0x1, 0x2, 0x0) r11 = socket$unix(0x1, 0x1, 0x0) dup2(r11, r10) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x2e1, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYRES16=r6, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a", @ANYBLOB="9384239aa34f943bbc3a977a76ac08ca94f00c0fe899ef57098795d8d1aa4b7088a17b8fd1680b9c80f9abe20b9444a49aa851cb1a6c899e89ae7f16e511bf1558c1b016ef71589e606ae31d69650e6352a61debc58b6dbdfb8f273119edaaae68d6ed12df04b34319ffef1f14acf2a848ce0e8801562bb239c2772d06ca2b9538ddacf529286d30e29c86199af0989223fa559181027a4bf5db19e82488b1699879b5f55d6981bce78464ca7061cc4884073415d3dd8acbcd7ad6fe9d81", @ANYRES16, @ANYRESDEC=r10], 0x5}}, 0x0) r12 = getpgrp(0x0) ptrace$setopts(0x4200, r12, 0x8, 0x2c) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x5, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb254409000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6800, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x10000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:43 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1077.468612][ T8044] device bridge_slave_1 left promiscuous mode [ 1077.478089][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1077.524257][ T8044] device bridge_slave_0 left promiscuous mode [ 1077.530542][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state 08:40:43 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1077.586218][ T8044] device veth1_vlan left promiscuous mode [ 1077.592254][ T8044] device veth0_vlan left promiscuous mode 08:40:43 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:43 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:44 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:44 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:44 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1079.032805][ T8044] device hsr_slave_0 left promiscuous mode [ 1079.072358][ T8044] device hsr_slave_1 left promiscuous mode [ 1079.120215][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1079.131968][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1079.145642][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1079.195936][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1079.277835][ T8044] bond0 (unregistering): Released all slaves [ 1079.376657][ T7697] 8021q: adding VLAN 0 to HW filter on device @ [ 1079.384190][ T7698] batman_adv: batadv0: Adding interface: veth67 [ 1079.390690][ T7698] batman_adv: batadv0: The MTU of interface veth67 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1079.416116][ T7698] batman_adv: batadv0: Not using interface veth67 (retrying later): interface not active [ 1079.426953][ T7699] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1079.436821][ T7700] batman_adv: batadv0: Adding interface: veth79 [ 1079.443170][ T7700] batman_adv: batadv0: The MTU of interface veth79 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1079.468390][ T7700] batman_adv: batadv0: Not using interface veth79 (retrying later): interface not active [ 1079.556463][ T7721] 8021q: adding VLAN 0 to HW filter on device @ [ 1079.572744][ T7726] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 08:40:45 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000100)) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) write$apparmor_exec(r5, &(0x7f0000000140)={'stack ', 'em0\x00'}, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xfffffffffffffc43) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3f000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:45 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb254609000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c00, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:45 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1079.809756][ T7763] batman_adv: batadv0: Adding interface: veth69 [ 1079.842072][ T7763] batman_adv: batadv0: The MTU of interface veth69 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1079.896157][ T7763] batman_adv: batadv0: Not using interface veth69 (retrying later): interface not active 08:40:45 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1080.005591][ T7772] batman_adv: batadv0: Adding interface: veth81 [ 1080.015541][ T7772] batman_adv: batadv0: The MTU of interface veth81 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1080.044745][ T7772] batman_adv: batadv0: Not using interface veth81 (retrying later): interface not active [ 1080.085343][ T7776] 8021q: adding VLAN 0 to HW filter on device @ 08:40:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7400, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1080.137860][ T7778] 8021q: adding VLAN 0 to HW filter on device @ 08:40:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb254809000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="000000000000000001000000140000005f"], 0x28}}, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r4, 0x0) bind$isdn_base(r4, &(0x7f00000000c0)={0x22, 0xb8, 0x2, 0x6, 0x5}, 0x6) 08:40:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x40000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1080.373603][ T7788] batman_adv: batadv0: Adding interface: veth71 [ 1080.416918][ T7788] batman_adv: batadv0: The MTU of interface veth71 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1080.560714][ T7788] batman_adv: batadv0: Not using interface veth71 (retrying later): interface not active 08:40:46 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1080.609027][ T7800] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1080.671730][ T7801] 8021q: adding VLAN 0 to HW filter on device @ [ 1080.690400][ T7802] batman_adv: batadv0: Adding interface: veth83 08:40:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x1, r3, 0x6) r4 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x5, 0x101) ioctl$EVIOCGMTSLOTS(r4, 0x8040450a, &(0x7f0000000480)=""/4096) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfd49, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x23, 0x45a0}, [@IFLA_PROTO_DOWN={0x5, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1080.704444][ T7802] batman_adv: batadv0: The MTU of interface veth83 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1080.780591][ T7802] batman_adv: batadv0: Not using interface veth83 (retrying later): interface not active [ 1080.842488][ T7806] 8021q: adding VLAN 0 to HW filter on device @ 08:40:46 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7a00, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x60000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb254a09000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1081.120494][ T7814] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1081.288694][ T7828] batman_adv: batadv0: Adding interface: veth73 [ 1081.326193][ T7828] batman_adv: batadv0: The MTU of interface veth73 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1081.422170][ T7828] batman_adv: batadv0: Not using interface veth73 (retrying later): interface not active [ 1081.466950][ T7829] batman_adv: batadv0: Adding interface: veth85 [ 1081.504346][ T7829] batman_adv: batadv0: The MTU of interface veth85 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1081.637527][ T7829] batman_adv: batadv0: Not using interface veth85 (retrying later): interface not active [ 1081.670610][ T7833] 8021q: adding VLAN 0 to HW filter on device @ [ 1081.791818][ T7837] 8021q: adding VLAN 0 to HW filter on device @ [ 1082.442141][ T8044] tipc: TX() has been purged, node left! [ 1082.912189][ T7842] IPVS: ftp: loaded support on port[0] = 21 [ 1082.991121][ T7842] chnl_net:caif_netlink_parms(): no params data found [ 1083.042164][ T7842] bridge0: port 1(bridge_slave_0) entered blocking state [ 1083.049308][ T7842] bridge0: port 1(bridge_slave_0) entered disabled state [ 1083.057301][ T7842] device bridge_slave_0 entered promiscuous mode [ 1083.067054][ T8044] device bridge_slave_1 left promiscuous mode [ 1083.073375][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 1083.112859][ T8044] device bridge_slave_0 left promiscuous mode [ 1083.119105][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 1083.178388][ T8044] device veth1_vlan left promiscuous mode [ 1083.184457][ T8044] device veth0_vlan left promiscuous mode [ 1084.042322][ T8044] device hsr_slave_0 left promiscuous mode [ 1084.082249][ T8044] device hsr_slave_1 left promiscuous mode [ 1084.138998][ T8044] team0 (unregistering): Port device team_slave_1 removed [ 1084.149351][ T8044] team0 (unregistering): Port device team_slave_0 removed [ 1084.159536][ T8044] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1084.197574][ T8044] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1084.255492][ T8044] bond0 (unregistering): Released all slaves [ 1084.324915][ T7842] bridge0: port 2(bridge_slave_1) entered blocking state [ 1084.331975][ T7842] bridge0: port 2(bridge_slave_1) entered disabled state [ 1084.340460][ T7842] device bridge_slave_1 entered promiscuous mode [ 1084.358984][ T7842] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1084.370181][ T7842] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1084.389858][ T7842] team0: Port device team_slave_0 added [ 1084.397109][ T7842] team0: Port device team_slave_1 added [ 1084.454384][ T7842] device hsr_slave_0 entered promiscuous mode [ 1084.492457][ T7842] device hsr_slave_1 entered promiscuous mode [ 1084.532155][ T7842] debugfs: Directory 'hsr0' with parent '/' already present! [ 1084.628434][ T7842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1084.641139][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1084.662849][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1084.671082][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1084.681242][ T7842] 8021q: adding VLAN 0 to HW filter on device team0 [ 1084.692186][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1084.700825][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1084.709871][ T6080] bridge0: port 1(bridge_slave_0) entered blocking state [ 1084.717006][ T6080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1084.733854][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1084.741903][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1084.750685][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1084.759331][T28449] bridge0: port 2(bridge_slave_1) entered blocking state [ 1084.766387][T28449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1084.786090][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1084.795426][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1084.804429][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1084.815998][ T7842] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1084.827491][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1084.835907][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1084.844471][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1084.863636][ T7842] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1084.872859][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1084.880374][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1084.944490][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1084.969437][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1084.978895][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1084.990562][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1085.000177][ T7842] device veth0_vlan entered promiscuous mode [ 1085.015691][ T7842] device veth1_vlan entered promiscuous mode 08:40:50 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:50 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e22, @loopback}}, [0x101, 0x3, 0x3315, 0xda1b, 0x40, 0x4, 0x284, 0x0, 0x6, 0x400, 0x2, 0xfff, 0x0, 0x3, 0x5]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000240)=r3, 0x4) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000000000/0x18000)=nil, 0x0, 0x47, 0x0, 0x0, 0xffffffffffffff3c) ioctl$KVM_RUN(r8, 0xae80, 0x0) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) r11 = ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r11, &(0x7f0000000000/0x18000)=nil, 0x0, 0x47, 0x0, 0x0, 0xffffffffffffff3c) ioctl$KVM_RUN(r11, 0xae80, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYRESOCT, @ANYRESHEX=r5, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000e807b5004f3114319fbad6a7b23608f9e5aeb78c0e29b5b0c0cdf58bfeb8bd87f31862e78d697691a10f7d34d477577d410e48c82d35df962fa4676d3e614596fde15aa110e77979cd1878f20790cf310e2eb50c8427aeb9fe994649c11f72e9b7c4379c06467c511bc541237f62e85350ebe7dfd9bd97aea23fedd861", @ANYRESHEX=r8, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRESHEX=r4, @ANYRESOCT=r11]], 0x5}, 0x1, 0x0, 0x0, 0x45}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000074927797081000"/20, @ANYRES32=r4, @ANYBLOB="000000000000000008000a0014000000"], 0x28}}, 0x0) 08:40:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8100, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x65580000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb254c09000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:51 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:51 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$void(r2, 0x5451) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = socket$unix(0x1, 0x2, 0x0) r9 = socket$unix(0x1, 0x1, 0x0) dup2(r9, r8) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) r12 = ioctl$KVM_CREATE_VCPU(r11, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r12, &(0x7f0000000000/0x18000)=nil, 0x0, 0x47, 0x0, 0x0, 0xffffffffffffff3c) ioctl$KVM_RUN(r12, 0xae80, 0x0) r13 = socket$unix(0x1, 0x2, 0x0) r14 = socket$unix(0x1, 0x1, 0x0) r15 = dup2(r14, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="4800000010000507000000000000000000000004", @ANYRES64=r15, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES32=r12, @ANYRES16=r9], @ANYRES32=r7, @ANYRESDEC, @ANYRESDEC=0x0, @ANYRES32=r3], 0x7}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x70bd2c}, 0xffffffffffffffa3}}, 0x84840) [ 1085.472990][ T7865] batman_adv: batadv0: Adding interface: veth75 [ 1085.491298][ T7865] batman_adv: batadv0: The MTU of interface veth75 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1085.613682][ T7865] batman_adv: batadv0: Not using interface veth75 (retrying later): interface not active [ 1085.629572][ T7863] 8021q: adding VLAN 0 to HW filter on device @ [ 1085.639599][ T7873] batman_adv: batadv0: Adding interface: veth87 [ 1085.646074][ T7873] batman_adv: batadv0: The MTU of interface veth87 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1085.672483][ T7873] batman_adv: batadv0: Not using interface veth87 (retrying later): interface not active [ 1085.692092][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 08:40:51 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1085.709021][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1085.763696][ T7893] 8021q: adding VLAN 0 to HW filter on device @ 08:40:51 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7fc00700, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:51 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb256009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r4, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000240)=0x6, 0x2) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000140)=0x6, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b80000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1086.072438][ T6282] tipc: TX() has been purged, node left! 08:40:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) r6 = socket$unix(0x1, 0x2, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$nfc_llcp(r8, 0x118, 0x3, &(0x7f00000002c0)=""/105, 0x69) r9 = socket$unix(0x1, 0x2, 0x0) r10 = socket$unix(0x1, 0x1, 0x0) r11 = dup2(r10, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r12, 0xae01, 0x0) r13 = socket$unix(0x1, 0x2, 0x0) r14 = socket$unix(0x1, 0x1, 0x0) r15 = dup2(r14, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = socket$unix(0x1, 0x2, 0x0) r17 = socket$unix(0x1, 0x1, 0x0) dup2(r17, r16) sendmsg$nl_route(r1, &(0x7f0000000880)={0x0, 0x398, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYPTR, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRESHEX=r17, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="800100001200240225bd7000fcdbdf2507000000", @ANYRES32=r3, @ANYBLOB="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"], 0x180}}, 0x0) 08:40:52 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1086.453203][ T7911] batman_adv: batadv0: Adding interface: veth77 [ 1086.473185][ T7911] batman_adv: batadv0: The MTU of interface veth77 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1086.542162][ T7911] batman_adv: batadv0: Not using interface veth77 (retrying later): interface not active [ 1086.570996][ T7909] batman_adv: batadv0: Adding interface: veth89 [ 1086.580103][ T7909] batman_adv: batadv0: The MTU of interface veth89 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1086.682150][ T7909] batman_adv: batadv0: Not using interface veth89 (retrying later): interface not active [ 1086.718513][ T7924] 8021q: adding VLAN 0 to HW filter on device @ 08:40:52 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1086.867136][ T7947] 8021q: adding VLAN 0 to HW filter on device @ 08:40:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb256809000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x80c00700, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1087.331000][ T7979] batman_adv: batadv0: Adding interface: veth79 [ 1087.340733][ T7979] batman_adv: batadv0: The MTU of interface veth79 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1087.425239][ T7979] batman_adv: batadv0: Not using interface veth79 (retrying later): interface not active [ 1087.447248][ T7982] batman_adv: batadv0: Adding interface: veth93 [ 1087.456754][ T7982] batman_adv: batadv0: The MTU of interface veth93 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1087.502182][ T7982] batman_adv: batadv0: Not using interface veth93 (retrying later): interface not active [ 1087.528666][ T7983] 8021q: adding VLAN 0 to HW filter on device @ [ 1087.606693][ T7987] 8021q: adding VLAN 0 to HW filter on device @ [ 1087.945336][ T6282] device bridge_slave_1 left promiscuous mode [ 1087.951551][ T6282] bridge0: port 2(bridge_slave_1) entered disabled state [ 1087.993037][ T6282] device bridge_slave_0 left promiscuous mode [ 1087.999242][ T6282] bridge0: port 1(bridge_slave_0) entered disabled state [ 1088.045696][ T6282] device veth1_vlan left promiscuous mode [ 1088.051651][ T6282] device veth0_vlan left promiscuous mode [ 1088.962380][ T6282] device hsr_slave_0 left promiscuous mode [ 1089.022224][ T6282] device hsr_slave_1 left promiscuous mode [ 1089.078468][ T6282] team0 (unregistering): Port device team_slave_1 removed [ 1089.089285][ T6282] team0 (unregistering): Port device team_slave_0 removed [ 1089.099882][ T6282] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1089.135685][ T6282] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1089.234632][ T6282] bond0 (unregistering): Released all slaves [ 1089.349750][ T7994] IPVS: ftp: loaded support on port[0] = 21 [ 1089.406749][ T7994] chnl_net:caif_netlink_parms(): no params data found [ 1089.434505][ T7994] bridge0: port 1(bridge_slave_0) entered blocking state [ 1089.441654][ T7994] bridge0: port 1(bridge_slave_0) entered disabled state [ 1089.449589][ T7994] device bridge_slave_0 entered promiscuous mode [ 1089.457222][ T7994] bridge0: port 2(bridge_slave_1) entered blocking state [ 1089.464649][ T7994] bridge0: port 2(bridge_slave_1) entered disabled state [ 1089.472781][ T7994] device bridge_slave_1 entered promiscuous mode [ 1089.575043][ T7994] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1089.586032][ T7994] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1089.607245][ T7994] team0: Port device team_slave_0 added [ 1089.614358][ T7994] team0: Port device team_slave_1 added [ 1089.701039][ T7994] device hsr_slave_0 entered promiscuous mode [ 1089.768125][ T7994] device hsr_slave_1 entered promiscuous mode [ 1089.822317][ T7994] debugfs: Directory 'hsr0' with parent '/' already present! [ 1089.865675][ T7994] bridge0: port 2(bridge_slave_1) entered blocking state [ 1089.872809][ T7994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1089.880071][ T7994] bridge0: port 1(bridge_slave_0) entered blocking state [ 1089.887179][ T7994] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1089.939372][ T7994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1089.952411][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1089.960917][T28449] bridge0: port 1(bridge_slave_0) entered disabled state [ 1089.969394][T28449] bridge0: port 2(bridge_slave_1) entered disabled state [ 1089.982737][ T7994] 8021q: adding VLAN 0 to HW filter on device team0 [ 1089.993636][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1090.002443][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 1090.009564][ T8003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1090.038399][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1090.046896][ T6080] bridge0: port 2(bridge_slave_1) entered blocking state [ 1090.053959][ T6080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1090.067143][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1090.076185][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1090.085729][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1090.094641][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1090.107169][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1090.117329][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1090.132027][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1090.140470][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1090.151385][ T7994] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1090.212587][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1090.229013][ T7994] device veth0_vlan entered promiscuous mode [ 1090.235992][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1090.245297][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1090.253538][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1090.265650][ T7994] device veth1_vlan entered promiscuous mode [ 1090.352830][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1090.361228][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 08:40:56 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="94c2bc2567bd028e85cecc5de22ca248", 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:56 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb256c09000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1090.525130][ T8013] batman_adv: batadv0: Adding interface: veth81 [ 1090.531527][ T8013] batman_adv: batadv0: The MTU of interface veth81 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1090.572231][ T8013] batman_adv: batadv0: Not using interface veth81 (retrying later): interface not active [ 1090.587704][ T8014] batman_adv: batadv0: Adding interface: veth55 [ 1090.594326][ T8014] batman_adv: batadv0: The MTU of interface veth55 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1090.622236][ T8014] batman_adv: batadv0: Not using interface veth55 (retrying later): interface not active [ 1090.633737][ T8017] batman_adv: batadv0: Adding interface: veth95 [ 1090.640247][ T8017] batman_adv: batadv0: The MTU of interface veth95 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:56 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1090.670265][ T8017] batman_adv: batadv0: Not using interface veth95 (retrying later): interface not active [ 1090.687489][ T8011] 8021q: adding VLAN 0 to HW filter on device @ 08:40:56 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1090.855088][ T8028] 8021q: adding VLAN 0 to HW filter on device @ 08:40:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@setlink={0x20, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0xf0ffff}}, 0x20}}, 0x0) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={r8, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:56 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:40:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x81c00700, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:56 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1091.052073][ T6282] tipc: TX() has been purged, node left! 08:40:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb257409000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:40:57 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1091.431721][ T8054] batman_adv: batadv0: Adding interface: veth97 [ 1091.452118][ T8054] batman_adv: batadv0: The MTU of interface veth97 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1091.508377][ T8054] batman_adv: batadv0: Not using interface veth97 (retrying later): interface not active [ 1091.559292][ T8055] 8021q: adding VLAN 0 to HW filter on device @ [ 1091.588591][ T8057] batman_adv: batadv0: Adding interface: veth83 [ 1091.605281][ T8057] batman_adv: batadv0: The MTU of interface veth83 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1091.642373][ T8057] batman_adv: batadv0: Not using interface veth83 (retrying later): interface not active [ 1091.666519][ T8059] batman_adv: batadv0: Adding interface: veth61 [ 1091.674133][ T8059] batman_adv: batadv0: The MTU of interface veth61 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1091.712602][ T8059] batman_adv: batadv0: Not using interface veth61 (retrying later): interface not active 08:40:57 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1091.826704][ T8066] 8021q: adding VLAN 0 to HW filter on device @ 08:40:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x864946f6, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:40:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb257a09000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1092.148952][ T8079] batman_adv: batadv0: Adding interface: veth99 [ 1092.173122][ T8079] batman_adv: batadv0: The MTU of interface veth99 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000067bd00280012000c000100760700000000000000002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x4000008) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x1e, 0x2, 0x0) close(r7) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r7, 0x84, 0x0, &(0x7f0000000040)={r9, 0x0, 0x5}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000140)={r9, 0x7}, 0x8) [ 1092.260770][ T8079] batman_adv: batadv0: Not using interface veth99 (retrying later): interface not active 08:40:58 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1092.438479][ T8088] 8021q: adding VLAN 0 to HW filter on device @ [ 1092.493609][ T8089] batman_adv: batadv0: Adding interface: veth85 [ 1092.499902][ T8089] batman_adv: batadv0: The MTU of interface veth85 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:40:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x88a8ffff, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1092.569288][ T8089] batman_adv: batadv0: Not using interface veth85 (retrying later): interface not active 08:40:58 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1092.717117][ T8096] 8021q: adding VLAN 0 to HW filter on device @ [ 1092.746767][ T8108] batman_adv: batadv0: Adding interface: veth101 08:40:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb25fd09000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1092.764114][ T8108] batman_adv: batadv0: The MTU of interface veth101 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1092.844707][ T8108] batman_adv: batadv0: Not using interface veth101 (retrying later): interface not active [ 1092.962552][ T8118] 8021q: adding VLAN 0 to HW filter on device @ [ 1092.986161][ T8121] 8021q: adding VLAN 0 to HW filter on device @ [ 1093.305258][ T6282] device bridge_slave_1 left promiscuous mode [ 1093.311690][ T6282] bridge0: port 2(bridge_slave_1) entered disabled state [ 1093.352781][ T6282] device bridge_slave_0 left promiscuous mode [ 1093.359024][ T6282] bridge0: port 1(bridge_slave_0) entered disabled state [ 1093.426200][ T6282] device veth1_vlan left promiscuous mode [ 1093.432313][ T6282] device veth0_vlan left promiscuous mode [ 1094.342368][ T6282] device hsr_slave_0 left promiscuous mode [ 1094.382195][ T6282] device hsr_slave_1 left promiscuous mode [ 1094.428649][ T6282] team0 (unregistering): Port device team_slave_1 removed [ 1094.439021][ T6282] team0 (unregistering): Port device team_slave_0 removed [ 1094.449507][ T6282] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1094.506426][ T6282] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1094.604882][ T6282] bond0 (unregistering): Released all slaves [ 1094.709552][ T8127] IPVS: ftp: loaded support on port[0] = 21 [ 1094.767974][ T8127] chnl_net:caif_netlink_parms(): no params data found [ 1094.798412][ T8127] bridge0: port 1(bridge_slave_0) entered blocking state [ 1094.805534][ T8127] bridge0: port 1(bridge_slave_0) entered disabled state [ 1094.813531][ T8127] device bridge_slave_0 entered promiscuous mode [ 1094.821012][ T8127] bridge0: port 2(bridge_slave_1) entered blocking state [ 1094.828263][ T8127] bridge0: port 2(bridge_slave_1) entered disabled state [ 1094.836238][ T8127] device bridge_slave_1 entered promiscuous mode [ 1094.853419][ T8127] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1094.865500][ T8127] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1094.923341][ T8127] team0: Port device team_slave_0 added [ 1094.930604][ T8127] team0: Port device team_slave_1 added [ 1095.034528][ T8127] device hsr_slave_0 entered promiscuous mode [ 1095.072531][ T8127] device hsr_slave_1 entered promiscuous mode [ 1095.112102][ T8127] debugfs: Directory 'hsr0' with parent '/' already present! [ 1095.145631][ T8127] bridge0: port 2(bridge_slave_1) entered blocking state [ 1095.152798][ T8127] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1095.160054][ T8127] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.167174][ T8127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1095.215937][ T8127] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1095.233664][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1095.245837][ T6080] bridge0: port 1(bridge_slave_0) entered disabled state [ 1095.254164][ T6080] bridge0: port 2(bridge_slave_1) entered disabled state [ 1095.271056][ T8127] 8021q: adding VLAN 0 to HW filter on device team0 [ 1095.284242][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1095.293408][ T6080] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.300441][ T6080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1095.323580][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1095.332606][ T6080] bridge0: port 2(bridge_slave_1) entered blocking state [ 1095.339666][ T6080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1095.348643][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1095.357771][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1095.367313][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1095.387157][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1095.399266][ T8127] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1095.411829][ T8127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1095.422996][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1095.441059][ T8127] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1095.449352][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1095.457511][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1095.511906][ T8127] device veth0_vlan entered promiscuous mode [ 1095.520058][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1095.529919][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1095.539216][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1095.547792][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1095.559519][ T8127] device veth1_vlan entered promiscuous mode [ 1095.567361][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1095.715952][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 08:41:01 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x200, 0x0) bind$netlink(r3, &(0x7f00000003c0)={0x10, 0x0, 0x25dfdbfe, 0x10}, 0x176) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r5, 0x1, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000044}, 0x4c01) 08:41:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x9effffff, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb25fe09000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:41:01 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1095.915873][ T8153] batman_adv: batadv0: Adding interface: veth87 [ 1095.922513][ T8153] batman_adv: batadv0: The MTU of interface veth87 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1095.949294][ T8153] batman_adv: batadv0: Not using interface veth87 (retrying later): interface not active [ 1095.960741][ T8147] batman_adv: batadv0: Adding interface: veth67 08:41:01 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1095.998620][ T8147] batman_adv: batadv0: The MTU of interface veth67 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1096.026251][ T8147] batman_adv: batadv0: Not using interface veth67 (retrying later): interface not active [ 1096.079270][ T8152] batman_adv: batadv0: Adding interface: veth103 [ 1096.091917][ T8152] batman_adv: batadv0: The MTU of interface veth103 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:41:01 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1096.138774][ T8152] batman_adv: batadv0: Not using interface veth103 (retrying later): interface not active [ 1096.168482][ T8151] 8021q: adding VLAN 0 to HW filter on device @ 08:41:01 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:02 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x200800, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x20, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x38, r2, 0x20, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_REG_RULES={0x1c, 0x22, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x6}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0xb73}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x8004}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x48, r8, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x6, 0x3, 0xe4e572ae4ff49fc3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x4040010}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc3ffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1096.295602][ T8173] 8021q: adding VLAN 0 to HW filter on device @ 08:41:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb25000a000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1096.549680][ T8184] batman_adv: batadv0: Adding interface: veth69 [ 1096.556316][ T8184] batman_adv: batadv0: The MTU of interface veth69 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1096.586947][ T8184] batman_adv: batadv0: Not using interface veth69 (retrying later): interface not active [ 1096.646743][ T8195] batman_adv: batadv0: Adding interface: veth89 [ 1096.668630][ T8195] batman_adv: batadv0: The MTU of interface veth89 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1096.695095][ T8195] batman_adv: batadv0: Not using interface veth89 (retrying later): interface not active [ 1096.715224][ T8196] batman_adv: batadv0: Adding interface: veth105 [ 1096.721662][ T8196] batman_adv: batadv0: The MTU of interface veth105 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:41:02 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1096.761399][ T8196] batman_adv: batadv0: Not using interface veth105 (retrying later): interface not active 08:41:02 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1096.828529][ T8201] 8021q: adding VLAN 0 to HW filter on device @ 08:41:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012060c000100766574680000000018002200fd0001000000e3ff22c0306554362ddde0bf1aa92fe7b70f5f5dbd0d224ed04acb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000067c121133595164d60801fe4a94b3f51d1ed416ae9945e9c3a385d8c4a7a57ad6835a4288ee6cb01bf9f8b42b7687f8d99ce01830e617091565a58c7d07259dd23aca19cfdb1d6e81de33feff4556ee32b180ab03f767282261bf1cebf6398b962a1247a7c9baa9c95e9338a5e18ad2671dbd", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="c600d7"], 0x28}}, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x2, 0xa, 0xb9, 0x0, 0x13, 0x0, 0x70bd25, 0x25dfdbfe, [@sadb_x_filter={0x5, 0x1a, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@loopback, 0x3, 0x14, 0x4}, @sadb_x_policy={0x8, 0x12, 0x2, 0x0, 0x0, 0x0, 0xfffffd8f, {0x6, 0xe6, 0x2, 0x80, 0x0, 0x5db3, 0x0, @in=@rand_addr=0x2}}, @sadb_lifetime={0x4, 0x5, 0x33, 0x8, 0x6, 0x9}]}, 0x98}}, 0x10000000) [ 1096.906957][ T8208] 8021q: adding VLAN 0 to HW filter on device @ 08:41:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe4ffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:02 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb25000b000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:41:02 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1097.219970][ T8227] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1097.274980][ T8226] batman_adv: batadv0: Adding interface: veth107 [ 1097.281580][ T8226] batman_adv: batadv0: The MTU of interface veth107 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1097.308803][ T8226] batman_adv: batadv0: Not using interface veth107 (retrying later): interface not active [ 1097.333387][ T8228] batman_adv: batadv0: Adding interface: veth91 [ 1097.339685][ T8228] batman_adv: batadv0: The MTU of interface veth91 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1097.365191][ T8228] batman_adv: batadv0: Not using interface veth91 (retrying later): interface not active 08:41:03 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1097.483154][ T8239] 8021q: adding VLAN 0 to HW filter on device @ [ 1097.491584][ T8227] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 08:41:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:03 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:03 executing program 2: rt_sigpending(&(0x7f0000000240), 0x8) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat(r5, &(0x7f0000000140)='./file0\x00', 0x2000, 0x2) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r7, 0x0) r8 = socket$unix(0x1, 0x2, 0x0) r9 = socket$unix(0x1, 0x2, 0x0) r10 = socket$unix(0x1, 0x1, 0x0) r11 = dup2(r10, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$BINDER_SET_MAX_THREADS(r11, 0x40046205, &(0x7f00000002c0)=0x81) r12 = socket$unix(0x1, 0x1, 0x0) r13 = dup2(r12, r8) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$UDMABUF_CREATE_LIST(r7, 0x40087543, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r13, @ANYBLOB="00000000000000000000010000f0ffff00000000", @ANYRES32=r6, @ANYBLOB="0016fffaffff000000a491e5fbe1f84816e231fff08c3b8ba36ba343d3a4075ca63d21186dc24f71a6223ab0bed4a1bc775921dcfa2690fbf2d6a191c27dc7fd7c6e14a555cd1dab03e08a3ef43e96cbb10ebd03d9ed94c0f07c8728c8c9a61d9eb93252d45a246d6e6d371b9b3fa19baabf8977f2e6d4f411c10c7a7252250915a0d963127ffa8d0306001caf5ea9f55d64f286c181c6e9ffc294b884d2797e67d2d865146ca9b1a5c4680b684186ca3fa7eef545630b"]) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r14, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r14}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb25000c000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1097.682648][ T2640] tipc: TX() has been purged, node left! 08:41:03 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1097.948942][ T8258] batman_adv: batadv0: Adding interface: veth93 [ 1097.972138][ T8258] batman_adv: batadv0: The MTU of interface veth93 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1098.042154][ T8258] batman_adv: batadv0: Not using interface veth93 (retrying later): interface not active 08:41:03 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1098.091391][ T8263] batman_adv: batadv0: Adding interface: veth109 [ 1098.115238][ T8263] batman_adv: batadv0: The MTU of interface veth109 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1098.204776][ T8263] batman_adv: batadv0: Not using interface veth109 (retrying later): interface not active [ 1098.252456][ T8268] 8021q: adding VLAN 0 to HW filter on device @ [ 1098.376616][ T8278] 8021q: adding VLAN 0 to HW filter on device @ 08:41:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:04 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) 08:41:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf6464986, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:04 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb25000d000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1098.794601][ T8288] batman_adv: batadv0: Adding interface: veth95 [ 1098.817381][ T8288] batman_adv: batadv0: The MTU of interface veth95 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1098.905234][ T8288] batman_adv: batadv0: Not using interface veth95 (retrying later): interface not active [ 1098.982737][ T8301] batman_adv: batadv0: Adding interface: veth111 [ 1099.006086][ T8301] batman_adv: batadv0: The MTU of interface veth111 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:41:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYRESDEC=r1, @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}, 0x1, 0x0, 0x0, 0x40000}, 0x20000004) r4 = socket(0x1e, 0x2, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) sendto$netrom(r4, &(0x7f0000000340)="5a04b185ac3dc7f1cdd41a059ae7573878da4eabd8144324dd3dec428cd620824f5bd9326d25523195a49e8f7fae8306a5836cc0d1", 0x35, 0x17f51b7c4b1e5a18, &(0x7f0000000380)={{0x3, @bcast, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x400000, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000040)={r6, 0x0, 0x5}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={r6, 0x78, &(0x7f00000002c0)=[@in6={0xa, 0x4e24, 0x5, @local, 0xffffff81}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x9, @empty, 0x3}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000240)=0x10) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-control\x00', 0xfc7f43ae1953c8ef, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r7, 0x81785501, &(0x7f00000004c0)=""/243) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) shutdown(r1, 0x1) [ 1099.075194][ T8301] batman_adv: batadv0: Not using interface veth111 (retrying later): interface not active 08:41:04 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1099.117138][ T8302] 8021q: adding VLAN 0 to HW filter on device @ 08:41:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x10000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb25000e000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:41:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0xfffffffd, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x5, 0xa, 0x14}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) epoll_create(0x7) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r9 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcsa\x00', 0x8c0000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(r9, 0x8, r10) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) ioctl$TIOCGSERIAL(r9, 0x541e, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=""/4096}) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) time(&(0x7f0000000340)) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@setlink={0x20, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r11, 0xf0ffff}}, 0x20}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000640)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20002}, 0xc, &(0x7f0000000600)={&(0x7f0000000480)=ANY=[@ANYBLOB="5c0100001a0000002bbd7000ffdbdf251c100002f800c808000c000014001200110053745ba7edcd621866504c66c5a48400130000000200000f0f0000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000040000000f0000000f0000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000100000709000000000000000e0005001a003f00000008000100000000000c0009002000001f", @ANYRES32=r11, @ANYBLOB="840013000000000000000100000001000000000000000f000000000000000d000000000000000000000006000000070000000000000000000000040000000400000000000000000000000a00000f0f0000000000000000000000010000000f000000000000000a000000000000000000000008000000000000000000000000000000000008000506", @ANYRES32=r12, @ANYBLOB], 0x15c}, 0x1, 0x0, 0x0, 0x8004}, 0x8000010) [ 1099.631482][ T8330] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1099.640392][ T8331] batman_adv: batadv0: Adding interface: veth97 [ 1099.651992][ T8331] batman_adv: batadv0: The MTU of interface veth97 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1099.681422][ T8331] batman_adv: batadv0: Not using interface veth97 (retrying later): interface not active [ 1099.706496][ T8333] 8021q: adding VLAN 0 to HW filter on device @ [ 1099.828414][ T8337] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1099.925518][ T2640] device bridge_slave_1 left promiscuous mode [ 1099.931698][ T2640] bridge0: port 2(bridge_slave_1) entered disabled state [ 1099.992791][ T2640] device bridge_slave_0 left promiscuous mode [ 1099.998999][ T2640] bridge0: port 1(bridge_slave_0) entered disabled state [ 1100.036234][ T2640] device veth1_vlan left promiscuous mode [ 1100.042191][ T2640] device veth0_vlan left promiscuous mode [ 1100.942361][ T2640] device hsr_slave_0 left promiscuous mode [ 1100.982144][ T2640] device hsr_slave_1 left promiscuous mode [ 1101.058777][ T2640] team0 (unregistering): Port device team_slave_1 removed [ 1101.069636][ T2640] team0 (unregistering): Port device team_slave_0 removed [ 1101.079486][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1101.135092][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1101.194801][ T2640] bond0 (unregistering): Released all slaves [ 1101.328494][ T8342] IPVS: ftp: loaded support on port[0] = 21 [ 1101.385806][ T8342] chnl_net:caif_netlink_parms(): no params data found [ 1101.418640][ T8342] bridge0: port 1(bridge_slave_0) entered blocking state [ 1101.425770][ T8342] bridge0: port 1(bridge_slave_0) entered disabled state [ 1101.433824][ T8342] device bridge_slave_0 entered promiscuous mode [ 1101.441845][ T8342] bridge0: port 2(bridge_slave_1) entered blocking state [ 1101.449435][ T8342] bridge0: port 2(bridge_slave_1) entered disabled state [ 1101.457712][ T8342] device bridge_slave_1 entered promiscuous mode [ 1101.527057][ T8342] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1101.541440][ T8342] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1101.565648][ T8342] team0: Port device team_slave_0 added [ 1101.575774][ T8342] team0: Port device team_slave_1 added [ 1101.665415][ T8342] device hsr_slave_0 entered promiscuous mode [ 1101.772695][ T8342] device hsr_slave_1 entered promiscuous mode [ 1101.922128][ T8342] debugfs: Directory 'hsr0' with parent '/' already present! [ 1101.954693][ T8342] bridge0: port 2(bridge_slave_1) entered blocking state [ 1101.961824][ T8342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1101.969204][ T8342] bridge0: port 1(bridge_slave_0) entered blocking state [ 1101.976239][ T8342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1102.008709][ T8342] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1102.020842][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1102.029507][ T6071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1102.037982][ T6071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1102.051633][ T8342] 8021q: adding VLAN 0 to HW filter on device team0 [ 1102.074908][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1102.083550][ T6080] bridge0: port 1(bridge_slave_0) entered blocking state [ 1102.090600][ T6080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1102.114874][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1102.124555][T28449] bridge0: port 2(bridge_slave_1) entered blocking state [ 1102.131635][T28449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1102.141065][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1102.158263][ T8342] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1102.169133][ T8342] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1102.182329][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1102.190850][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1102.199919][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1102.209093][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1102.217803][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1102.235411][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1102.243237][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1102.254203][ T8342] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1102.305991][ T5781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1102.324561][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1102.333506][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1102.341446][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1102.351325][ T8342] device veth0_vlan entered promiscuous mode [ 1102.361576][ T8342] device veth1_vlan entered promiscuous mode 08:41:08 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffa888, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:08 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x20000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250011000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:41:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@setlink={0x20, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0xf0ffff}}, 0x20}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@getchain={0x3c, 0x66, 0x0, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0x10, 0xfff3}, {0xfff1, 0xfff3}, {0x2, 0xffe8}}, [{0x8}, {0x8, 0xb, 0x9}, {0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40004) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892e08051404bde5bf29b63c566a03d724f7ead1ef6ff07c3edfc4c46c33adfdbe08b8c5236b93b979", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB='\x00'/16], 0x28}}, 0x0) [ 1102.611662][ T8360] batman_adv: batadv0: Adding interface: veth113 [ 1102.618305][ T8360] batman_adv: batadv0: The MTU of interface veth113 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1102.644079][ T8360] batman_adv: batadv0: Not using interface veth113 (retrying later): interface not active [ 1102.655017][ T8356] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1102.682969][ T8361] batman_adv: batadv0: Adding interface: veth99 [ 1102.689252][ T8361] batman_adv: batadv0: The MTU of interface veth99 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1102.720475][ T8361] batman_adv: batadv0: Not using interface veth99 (retrying later): interface not active 08:41:08 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1102.741527][ T8364] 8021q: adding VLAN 0 to HW filter on device @ 08:41:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff7f, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1102.882998][ T144] tipc: TX() has been purged, node left! [ 1102.907701][ T8374] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 08:41:08 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x369b26c9, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1102.935225][ T8375] 8021q: adding VLAN 0 to HW filter on device @ 08:41:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250012000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:41:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r4, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRESHEX=r4, @ANYBLOB="0000000000000000280012000c000108766574680000000018002200ff0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}, 0x1, 0x0, 0x0, 0x8040}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:08 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:08 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$CAPI_NCCI_GETUNIT(r4, 0x80044327, &(0x7f0000000240)=0x7fff) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffdeb, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}, 0x1, 0x0, 0x0, 0x4081}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1103.321391][ T8389] batman_adv: batadv0: Adding interface: veth115 [ 1103.344385][ T8389] batman_adv: batadv0: The MTU of interface veth115 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1103.422140][ T8389] batman_adv: batadv0: Not using interface veth115 (retrying later): interface not active [ 1103.461905][ T8390] batman_adv: batadv0: Adding interface: veth103 [ 1103.483893][ T8390] batman_adv: batadv0: The MTU of interface veth103 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1103.595030][ T8390] batman_adv: batadv0: Not using interface veth103 (retrying later): interface not active 08:41:09 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1103.647604][ T8398] 8021q: adding VLAN 0 to HW filter on device @ 08:41:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff9e, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept(r3, &(0x7f00000002c0)=@ethernet={0x0, @link_local}, &(0x7f0000000140)=0x80) connect$l2tp6(r4, &(0x7f0000000240)={0xa, 0x0, 0x401, @rand_addr="aedee8ea69de82455b1382bd80c60558", 0xfffffff9, 0x4}, 0x20) r5 = socket$unix(0x1, 0x2, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SG_GET_TIMEOUT(r7, 0x2202, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250014000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:41:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3f000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:09 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1104.294965][ T8428] batman_adv: batadv0: Adding interface: veth89 [ 1104.304510][ T8428] batman_adv: batadv0: The MTU of interface veth89 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1104.365175][ T8428] batman_adv: batadv0: Not using interface veth89 (retrying later): interface not active [ 1104.399794][ T8430] batman_adv: batadv0: Adding interface: veth117 [ 1104.409593][ T8430] batman_adv: batadv0: The MTU of interface veth117 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:41:10 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1104.478623][ T8430] batman_adv: batadv0: Not using interface veth117 (retrying later): interface not active [ 1104.544697][ T8433] batman_adv: batadv0: Adding interface: veth105 [ 1104.552200][ T8433] batman_adv: batadv0: The MTU of interface veth105 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1104.656625][ T8433] batman_adv: batadv0: Not using interface veth105 (retrying later): interface not active [ 1104.695525][ T8434] 8021q: adding VLAN 0 to HW filter on device @ [ 1104.814025][ T8449] 8021q: adding VLAN 0 to HW filter on device @ 08:41:10 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffc3, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1105.141361][ T8463] batman_adv: batadv0: Adding interface: veth119 [ 1105.148039][ T8463] batman_adv: batadv0: The MTU of interface veth119 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1105.176580][ T8463] batman_adv: batadv0: Not using interface veth119 (retrying later): interface not active [ 1105.283769][ T144] device bridge_slave_1 left promiscuous mode [ 1105.290113][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 1105.342931][ T144] device bridge_slave_0 left promiscuous mode [ 1105.349167][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 1105.386394][ T144] device veth1_vlan left promiscuous mode [ 1105.392759][ T144] device veth0_vlan left promiscuous mode [ 1106.323187][ T144] device hsr_slave_0 left promiscuous mode [ 1106.382272][ T144] device hsr_slave_1 left promiscuous mode [ 1106.448984][ T144] team0 (unregistering): Port device team_slave_1 removed [ 1106.459608][ T144] team0 (unregistering): Port device team_slave_0 removed [ 1106.476707][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1106.536313][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1106.605385][ T144] bond0 (unregistering): Released all slaves [ 1106.730020][ T8469] IPVS: ftp: loaded support on port[0] = 21 [ 1106.784830][ T8469] chnl_net:caif_netlink_parms(): no params data found [ 1106.813873][ T8469] bridge0: port 1(bridge_slave_0) entered blocking state [ 1106.820947][ T8469] bridge0: port 1(bridge_slave_0) entered disabled state [ 1106.828925][ T8469] device bridge_slave_0 entered promiscuous mode [ 1106.872197][ T8469] bridge0: port 2(bridge_slave_1) entered blocking state [ 1106.879372][ T8469] bridge0: port 2(bridge_slave_1) entered disabled state [ 1106.894595][ T8469] device bridge_slave_1 entered promiscuous mode [ 1106.918425][ T8469] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1106.929410][ T8469] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1106.956590][ T8469] team0: Port device team_slave_0 added [ 1106.966377][ T8469] team0: Port device team_slave_1 added [ 1107.054663][ T8469] device hsr_slave_0 entered promiscuous mode [ 1107.112510][ T8469] device hsr_slave_1 entered promiscuous mode [ 1107.162097][ T8469] debugfs: Directory 'hsr0' with parent '/' already present! [ 1107.198905][ T8469] bridge0: port 2(bridge_slave_1) entered blocking state [ 1107.206042][ T8469] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1107.213347][ T8469] bridge0: port 1(bridge_slave_0) entered blocking state [ 1107.220469][ T8469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1107.264241][ T8469] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1107.280099][ T6071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1107.289473][ T6071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1107.298140][ T6071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1107.316226][ T8469] 8021q: adding VLAN 0 to HW filter on device team0 [ 1107.336900][T28449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1107.349630][T28449] bridge0: port 1(bridge_slave_0) entered blocking state [ 1107.356809][T28449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1107.384592][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1107.396725][ T5751] bridge0: port 2(bridge_slave_1) entered blocking state [ 1107.403796][ T5751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1107.413639][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1107.422820][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1107.433419][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1107.441601][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1107.453614][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1107.463805][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1107.478539][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1107.486188][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1107.497393][ T8469] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1107.555707][ T5751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1107.574922][ T8469] device veth0_vlan entered promiscuous mode [ 1107.582829][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1107.591554][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1107.599615][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1107.619518][ T8469] device veth1_vlan entered promiscuous mode 08:41:13 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x40000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_getscheduler(r4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600006, 0x0, 0x4002011, r5, 0x0) connect$pppl2tp(r5, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x0, 0x3, 0x3, 0x3, {0xa, 0x4e22, 0x81, @local, 0x10000}}}, 0x32) 08:41:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250020000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:41:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffe4, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:13 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1107.732982][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1107.741513][ T6080] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1107.852266][ T8489] batman_adv: batadv0: Adding interface: veth123 [ 1107.858664][ T8489] batman_adv: batadv0: The MTU of interface veth123 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1107.885607][ T8489] batman_adv: batadv0: Not using interface veth123 (retrying later): interface not active [ 1107.956552][ T8486] 8021q: adding VLAN 0 to HW filter on device @ [ 1107.980718][ T8494] batman_adv: batadv0: Adding interface: veth91 [ 1107.990015][ T8494] batman_adv: batadv0: The MTU of interface veth91 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1108.015565][ T8494] batman_adv: batadv0: Not using interface veth91 (retrying later): interface not active [ 1108.027464][ T8495] batman_adv: batadv0: Adding interface: veth107 08:41:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000000140)='./file0\x00', 0x400000, 0x1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000240)=[@sack_perm], 0x1) [ 1108.055378][ T8495] batman_adv: batadv0: The MTU of interface veth107 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:41:13 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffff0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1108.107654][ T8495] batman_adv: batadv0: Not using interface veth107 (retrying later): interface not active [ 1108.321277][ T8500] 8021q: adding VLAN 0 to HW filter on device @ [ 1108.341237][ T8509] batman_adv: batadv0: Adding interface: veth93 08:41:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250025000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 1108.354614][ T8509] batman_adv: batadv0: The MTU of interface veth93 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1108.381112][ T2640] tipc: TX() has been purged, node left! [ 1108.396814][ T8509] batman_adv: batadv0: Not using interface veth93 (retrying later): interface not active 08:41:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x48000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:14 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1108.504761][ T8516] batman_adv: batadv0: Adding interface: veth127 08:41:14 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1108.535297][ T8516] batman_adv: batadv0: The MTU of interface veth127 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1108.586338][ T8516] batman_adv: batadv0: Not using interface veth127 (retrying later): interface not active 08:41:14 executing program 4: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x39, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1108.787963][ T8526] 8021q: adding VLAN 0 to HW filter on device @ 08:41:14 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) [ 1108.828644][ T8531] batman_adv: batadv0: Adding interface: veth109 [ 1108.839722][ T8531] batman_adv: batadv0: The MTU of interface veth109 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1108.947806][ T8531] batman_adv: batadv0: Not using interface veth109 (retrying later): interface not active 08:41:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0xf, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1109.146471][ T8535] 8021q: adding VLAN 0 to HW filter on device @ 08:41:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250045000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) 08:41:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x10, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 08:41:15 executing program 0: fstat(0xffffffffffffffff, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0xffffffffffff2f97) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) open$dir(0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x2, 0xfdf) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x61, &(0x7f0000000780)={[{@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 08:41:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4c000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1109.647159][ T8569] batman_adv: batadv0: Adding interface: veth111 [ 1109.671392][ T8569] batman_adv: batadv0: The MTU of interface veth111 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 08:41:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018002200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf29b63c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0xc0, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 1109.712099][ T8569] batman_adv: batadv0: Not using interface veth111 (retrying later): interface not active [ 1109.777670][ T8570] 8021q: adding VLAN 0 to HW filter on device @ [ 1109.842508][ T6080] ================================================================== [ 1109.850661][ T6080] BUG: KCSAN: data-race in watchdog / worker_thread [ 1109.857244][ T6080] [ 1109.859579][ T6080] read to 0xffff888121e670d0 of 8 bytes by task 959 on cpu 0: [ 1109.867050][ T6080] watchdog+0x2b1/0x960 [ 1109.871209][ T6080] kthread+0x1d4/0x200 [ 1109.875279][ T6080] ret_from_fork+0x1f/0x30 [ 1109.879681][ T6080] [ 1109.882019][ T6080] write to 0xffff888121e670d0 of 8 bytes by task 6080 on cpu 1: [ 1109.889659][ T6080] worker_thread+0x1c3/0x800 [ 1109.894258][ T6080] kthread+0x1d4/0x200 [ 1109.898340][ T6080] ret_from_fork+0x1f/0x30 [ 1109.902746][ T6080] [ 1109.905074][ T6080] Reported by Kernel Concurrency Sanitizer on: [ 1109.911234][ T6080] CPU: 1 PID: 6080 Comm: kworker/1:7 Not tainted 5.5.0-rc1-syzkaller #0 [ 1109.919565][ T6080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.929655][ T6080] Workqueue: 0x0 (events) [ 1109.934105][ T6080] ================================================================== [ 1109.942175][ T6080] Kernel panic - not syncing: panic_on_warn set ... [ 1109.948777][ T6080] CPU: 1 PID: 6080 Comm: kworker/1:7 Not tainted 5.5.0-rc1-syzkaller #0 [ 1109.957111][ T6080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.967213][ T6080] Workqueue: 0x0 (events) [ 1109.971638][ T6080] Call Trace: [ 1109.974947][ T6080] dump_stack+0x11d/0x181 [ 1109.979302][ T6080] panic+0x210/0x640 [ 1109.983220][ T6080] ? vprintk_func+0x8d/0x140 [ 1109.987830][ T6080] kcsan_report.cold+0xc/0xd [ 1109.992441][ T6080] kcsan_setup_watchpoint+0x3fe/0x460 [ 1109.997833][ T6080] __tsan_unaligned_write8+0xc7/0x110 [ 1110.003230][ T6080] worker_thread+0x1c3/0x800 [ 1110.007850][ T6080] kthread+0x1d4/0x200 [ 1110.011942][ T6080] ? rescuer_thread+0x6a0/0x6a0 [ 1110.016814][ T6080] ? kthread_unpark+0xe0/0xe0 [ 1110.021527][ T6080] ret_from_fork+0x1f/0x30 [ 1110.027295][ T6080] Kernel Offset: disabled [ 1110.033304][ T6080] Rebooting in 86400 seconds..