12095] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:29 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf403, {r0}}, 0x58) 17:22:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x10000000, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2725.456883][T12099] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2725.495362][T12099] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2725.514911][T12099] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2725.703056][T12101] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2725.731010][T12101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2725.739438][T12101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2726.448226][T12105] chnl_net:caif_netlink_parms(): no params data found [ 2726.488071][T12105] bridge0: port 1(bridge_slave_0) entered blocking state [ 2726.495108][T12105] bridge0: port 1(bridge_slave_0) entered disabled state [ 2726.504012][T12105] device bridge_slave_0 entered promiscuous mode [ 2726.514553][T12105] bridge0: port 2(bridge_slave_1) entered blocking state [ 2726.521660][T12105] bridge0: port 2(bridge_slave_1) entered disabled state [ 2726.531516][T12105] device bridge_slave_1 entered promiscuous mode [ 2726.555883][T12105] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2726.567846][T12105] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2726.591010][T12105] team0: Port device team_slave_0 added [ 2726.597453][T12105] team0: Port device team_slave_1 added [ 2726.609442][T14432] device hsr_slave_0 left promiscuous mode [ 2726.615657][T14432] device hsr_slave_1 left promiscuous mode [ 2726.624406][T14432] device veth1_macvtap left promiscuous mode [ 2726.630534][T14432] device veth0_macvtap left promiscuous mode [ 2726.636543][T14432] device veth1_vlan left promiscuous mode [ 2726.642313][T14432] device veth0_vlan left promiscuous mode [ 2726.769403][T14432] bond0 (unregistering): Released all slaves [ 2726.823048][T12105] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2726.830086][T12105] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2726.856082][T12105] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2726.868097][T12105] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2726.875220][T12105] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2726.901147][T12105] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2726.925158][T12105] device hsr_slave_0 entered promiscuous mode [ 2726.931967][T12105] device hsr_slave_1 entered promiscuous mode [ 2726.939363][T12105] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2726.947672][T12105] Cannot create hsr debugfs directory [ 2726.984552][T12105] bridge0: port 2(bridge_slave_1) entered blocking state [ 2726.991629][T12105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2726.999028][T12105] bridge0: port 1(bridge_slave_0) entered blocking state [ 2727.006089][T12105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2727.041109][T12105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2727.052495][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2727.060726][T17104] bridge0: port 1(bridge_slave_0) entered disabled state [ 2727.068768][T17104] bridge0: port 2(bridge_slave_1) entered disabled state [ 2727.080862][T12105] 8021q: adding VLAN 0 to HW filter on device team0 [ 2727.091247][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2727.099635][T17104] bridge0: port 1(bridge_slave_0) entered blocking state [ 2727.106762][T17104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2727.128162][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2727.136894][T11867] bridge0: port 2(bridge_slave_1) entered blocking state [ 2727.143911][T11867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2727.152838][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2727.161807][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2727.170830][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2727.179037][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2727.189259][T12105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2727.197938][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2727.211337][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2727.219019][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2727.228488][T12105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2727.367396][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2727.376092][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2727.459746][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2727.469134][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2727.479946][T12105] device veth0_vlan entered promiscuous mode [ 2727.486725][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2727.494590][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2727.505334][T12105] device veth1_vlan entered promiscuous mode [ 2727.519416][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2727.527840][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2727.535834][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2727.545481][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2727.555271][T12105] device veth0_macvtap entered promiscuous mode [ 2727.564362][T12105] device veth1_macvtap entered promiscuous mode [ 2727.576166][T12105] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2727.583694][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2727.592146][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2727.600413][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2727.609023][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2727.619634][T12105] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2727.627133][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2727.635773][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2727.704844][T12133] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2727.727928][T12133] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2727.737612][T12133] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2727.755024][T12133] device bridge_slave_0 left promiscuous mode [ 2727.761704][T12133] bridge0: port 1(bridge_slave_0) entered disabled state [ 2727.777468][T12133] device bridge_slave_1 left promiscuous mode [ 2727.784093][T12133] bridge0: port 2(bridge_slave_1) entered disabled state [ 2727.804204][T12133] bond0: (slave bond_slave_0): Releasing backup interface [ 2727.841247][T12133] bond0: (slave bond_slave_1): Releasing backup interface [ 2727.917346][T12133] team0: Port device team_slave_0 removed [ 2727.968662][T12133] team0: Port device team_slave_1 removed [ 2727.979632][T12133] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2727.987252][T12133] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2728.002772][T12133] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2728.010452][T12133] batman_adv: batadv0: Removing interface: batadv_slave_1 17:22:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000021000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:22:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf601, {r0}}, 0x58) 17:22:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x21000000, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2728.093365][T12135] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:22:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf603, {r0}}, 0x58) 17:22:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf800, {r0}}, 0x58) [ 2728.231756][T12139] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:22:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf802, {r0}}, 0x58) [ 2728.288356][T12139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2728.308005][T12139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf803, {r0}}, 0x58) 17:22:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfa03, {r0}}, 0x58) 17:22:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfc00, {r0}}, 0x58) [ 2728.527783][T12142] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2728.585173][T12142] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2728.607161][T12142] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2728.810100][T12143] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2728.855031][T12143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2728.864230][T12143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x60000000, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfc03, {r0}}, 0x58) [ 2729.091152][T12261] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2729.121523][T12261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2729.130331][T12261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2729.253690][T12262] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2729.278588][T12262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2729.287388][T12262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2729.738903][T14432] device hsr_slave_0 left promiscuous mode [ 2729.745200][T14432] device hsr_slave_1 left promiscuous mode [ 2729.753909][T14432] device veth1_macvtap left promiscuous mode [ 2729.759922][T14432] device veth0_macvtap left promiscuous mode [ 2729.766014][T14432] device veth1_vlan left promiscuous mode [ 2729.771754][T14432] device veth0_vlan left promiscuous mode [ 2729.892075][T14432] bond0 (unregistering): Released all slaves [ 2730.101665][T12264] chnl_net:caif_netlink_parms(): no params data found [ 2730.139312][T12264] bridge0: port 1(bridge_slave_0) entered blocking state [ 2730.146422][T12264] bridge0: port 1(bridge_slave_0) entered disabled state [ 2730.154194][T12264] device bridge_slave_0 entered promiscuous mode [ 2730.162535][T12264] bridge0: port 2(bridge_slave_1) entered blocking state [ 2730.169745][T12264] bridge0: port 2(bridge_slave_1) entered disabled state [ 2730.178661][T12264] device bridge_slave_1 entered promiscuous mode [ 2730.197569][T12264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2730.207936][T12264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2730.238355][T12264] team0: Port device team_slave_0 added [ 2730.245158][T12264] team0: Port device team_slave_1 added [ 2730.279656][T12264] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2730.286651][T12264] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2730.313065][T12264] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2730.357514][T12264] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2730.364465][T12264] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2730.390389][T12264] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2730.417131][T12264] device hsr_slave_0 entered promiscuous mode [ 2730.434412][T12264] device hsr_slave_1 entered promiscuous mode [ 2730.446719][T12264] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2730.454267][T12264] Cannot create hsr debugfs directory [ 2730.508876][T12264] bridge0: port 2(bridge_slave_1) entered blocking state [ 2730.515922][T12264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2730.523236][T12264] bridge0: port 1(bridge_slave_0) entered blocking state [ 2730.530299][T12264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2730.562654][T12264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2730.573751][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2730.582434][T17104] bridge0: port 1(bridge_slave_0) entered disabled state [ 2730.590416][T17104] bridge0: port 2(bridge_slave_1) entered disabled state [ 2730.602451][T12264] 8021q: adding VLAN 0 to HW filter on device team0 [ 2730.612726][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2730.621167][T11867] bridge0: port 1(bridge_slave_0) entered blocking state [ 2730.628299][T11867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2730.647804][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2730.656243][T11867] bridge0: port 2(bridge_slave_1) entered blocking state [ 2730.663262][T11867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2730.672034][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2730.680972][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2730.689608][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2730.699833][T12264] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2730.711020][T12264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2730.719875][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2730.728368][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2730.742581][T12264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2730.751508][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2730.759053][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2730.813039][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2730.874934][T12264] device veth0_vlan entered promiscuous mode [ 2730.882178][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2730.891977][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2730.899856][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2730.911161][T12264] device veth1_vlan entered promiscuous mode [ 2730.918042][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2730.932883][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2730.942472][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2730.952165][T12264] device veth0_macvtap entered promiscuous mode [ 2730.961800][T12264] device veth1_macvtap entered promiscuous mode [ 2730.974466][T12264] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2730.982827][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2730.992674][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2731.004114][T12264] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2731.012115][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2731.079618][T12292] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2731.101803][T12292] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2731.110568][T12292] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2731.129152][T12292] device bridge_slave_0 left promiscuous mode [ 2731.136009][T12292] bridge0: port 1(bridge_slave_0) entered disabled state [ 2731.153043][T12292] device bridge_slave_1 left promiscuous mode [ 2731.159875][T12292] bridge0: port 2(bridge_slave_1) entered disabled state [ 2731.178604][T12292] bond0: (slave bond_slave_0): Releasing backup interface [ 2731.214875][T12292] bond0: (slave bond_slave_1): Releasing backup interface [ 2731.290591][T12292] team0: Port device team_slave_0 removed [ 2731.339079][T12292] team0: Port device team_slave_1 removed [ 2731.350283][T12292] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2731.358283][T12292] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2731.371855][T12292] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2731.379634][T12292] batman_adv: batadv0: Removing interface: batadv_slave_1 17:22:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000025000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:22:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfe00, {r0}}, 0x58) 17:22:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x65580000, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfe03, {r0}}, 0x58) [ 2731.486840][T12295] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:22:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfeff, {r0}}, 0x58) [ 2731.594142][T12297] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:22:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xff00, {r0}}, 0x58) [ 2731.647874][T12297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2731.665384][T12297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xff03, {r0}}, 0x58) 17:22:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xff0f, {r0}}, 0x58) 17:22:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfffe, {r0}}, 0x58) [ 2731.950203][T12300] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2732.012862][T12300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2732.037045][T12300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2732.274692][T12314] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2732.288165][T12314] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2732.295674][T12314] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2732.324515][T12295] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2732.414898][T12316] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2732.442623][T12316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2732.451289][T12316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:36 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3ffff, {r0}}, 0x58) 17:22:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x81000000, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2732.654743][T12320] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2732.684521][T12320] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2732.692930][T12320] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2732.820390][T12321] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2732.832288][T12321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2732.839962][T12321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2733.138425][T14432] device hsr_slave_0 left promiscuous mode [ 2733.144490][T14432] device hsr_slave_1 left promiscuous mode [ 2733.154681][T14432] device veth1_macvtap left promiscuous mode [ 2733.160793][T14432] device veth0_macvtap left promiscuous mode [ 2733.166790][T14432] device veth1_vlan left promiscuous mode [ 2733.172640][T14432] device veth0_vlan left promiscuous mode [ 2733.393397][T14432] bond0 (unregistering): Released all slaves [ 2733.519579][T12323] chnl_net:caif_netlink_parms(): no params data found [ 2733.558803][T12323] bridge0: port 1(bridge_slave_0) entered blocking state [ 2733.565846][T12323] bridge0: port 1(bridge_slave_0) entered disabled state [ 2733.574439][T12323] device bridge_slave_0 entered promiscuous mode [ 2733.581906][T12323] bridge0: port 2(bridge_slave_1) entered blocking state [ 2733.588971][T12323] bridge0: port 2(bridge_slave_1) entered disabled state [ 2733.597828][T12323] device bridge_slave_1 entered promiscuous mode [ 2733.615462][T12323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2733.626821][T12323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2733.646894][T12323] team0: Port device team_slave_0 added [ 2733.653365][T12323] team0: Port device team_slave_1 added [ 2733.686455][T12323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2733.693474][T12323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2733.719448][T12323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2733.778419][T12323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2733.785389][T12323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2733.811311][T12323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2733.859884][T12323] device hsr_slave_0 entered promiscuous mode [ 2733.868012][T12323] device hsr_slave_1 entered promiscuous mode [ 2733.874495][T12323] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2733.882072][T12323] Cannot create hsr debugfs directory [ 2733.926900][T12323] bridge0: port 2(bridge_slave_1) entered blocking state [ 2733.933973][T12323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2733.941377][T12323] bridge0: port 1(bridge_slave_0) entered blocking state [ 2733.948425][T12323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2733.980249][T12323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2733.992050][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2734.000583][T16602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2734.009556][T16602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2734.021590][T12323] 8021q: adding VLAN 0 to HW filter on device team0 [ 2734.031988][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2734.040471][T11867] bridge0: port 1(bridge_slave_0) entered blocking state [ 2734.047511][T11867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2734.068266][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2734.076930][T16602] bridge0: port 2(bridge_slave_1) entered blocking state [ 2734.083961][T16602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2734.093225][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2734.102085][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2734.110687][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2734.121210][T12323] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2734.133082][T12323] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2734.141609][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2734.150189][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2734.164213][T12323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2734.172960][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2734.180807][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2734.234759][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2734.295273][T12323] device veth0_vlan entered promiscuous mode [ 2734.303629][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2734.312672][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2734.320473][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2734.330652][T12323] device veth1_vlan entered promiscuous mode [ 2734.337607][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2734.353553][T12323] device veth0_macvtap entered promiscuous mode [ 2734.360679][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2734.369250][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2734.377912][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2734.386996][T12323] device veth1_macvtap entered promiscuous mode [ 2734.400493][T12323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2734.408469][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2734.419148][T12323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2734.427433][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2734.487667][T12351] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2734.510352][T12351] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2734.519254][T12351] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2734.537970][T12351] device bridge_slave_0 left promiscuous mode [ 2734.544721][T12351] bridge0: port 1(bridge_slave_0) entered disabled state [ 2734.559441][T12351] device bridge_slave_1 left promiscuous mode [ 2734.566232][T12351] bridge0: port 2(bridge_slave_1) entered disabled state [ 2734.584267][T12351] bond0: (slave bond_slave_0): Releasing backup interface [ 2734.621186][T12351] bond0: (slave bond_slave_1): Releasing backup interface [ 2734.697899][T12351] team0: Port device team_slave_0 removed [ 2734.745376][T12351] team0: Port device team_slave_1 removed [ 2734.755990][T12351] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2734.763839][T12351] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2734.777794][T12351] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2734.785593][T12351] batman_adv: batadv0: Removing interface: batadv_slave_1 17:22:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400022e000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:22:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x40000, {r0}}, 0x58) 17:22:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x81ffffff, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000, {r0}}, 0x58) [ 2734.969463][T12359] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:22:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1fffff, {r0}}, 0x58) 17:22:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x400000, {r0}}, 0x58) [ 2735.041600][T12359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2735.066851][T12359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xaded85, {r0}}, 0x58) 17:22:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1000000, {r0}}, 0x58) 17:22:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1020000, {r0}}, 0x58) [ 2735.318790][T12358] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2735.425122][T12353] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2735.474394][T12353] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2735.492869][T12353] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2735.701047][T12358] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:22:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x88470000, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2735.836479][T12374] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2735.863712][T12374] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2735.874381][T12374] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2735.986659][T12375] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2735.998561][T12375] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2736.005987][T12375] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2736.339209][T14432] device hsr_slave_0 left promiscuous mode [ 2736.345481][T14432] device hsr_slave_1 left promiscuous mode [ 2736.354637][T14432] device veth1_macvtap left promiscuous mode [ 2736.360658][T14432] device veth0_macvtap left promiscuous mode [ 2736.366683][T14432] device veth1_vlan left promiscuous mode [ 2736.372440][T14432] device veth0_vlan left promiscuous mode [ 2736.492077][T14432] bond0 (unregistering): Released all slaves [ 2736.848552][T12377] chnl_net:caif_netlink_parms(): no params data found [ 2736.911451][T12377] bridge0: port 1(bridge_slave_0) entered blocking state [ 2736.918558][T12377] bridge0: port 1(bridge_slave_0) entered disabled state [ 2736.937042][T12377] device bridge_slave_0 entered promiscuous mode [ 2736.956910][T12377] bridge0: port 2(bridge_slave_1) entered blocking state [ 2736.964006][T12377] bridge0: port 2(bridge_slave_1) entered disabled state [ 2736.972205][T12377] device bridge_slave_1 entered promiscuous mode [ 2736.996834][T12377] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2737.027474][T12377] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2737.054768][T12377] team0: Port device team_slave_0 added [ 2737.071350][T12377] team0: Port device team_slave_1 added [ 2737.087882][T12377] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2737.094832][T12377] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2737.120824][T12377] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2737.133130][T12377] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2737.140388][T12377] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2737.166322][T12377] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2737.190027][T12377] device hsr_slave_0 entered promiscuous mode [ 2737.196715][T12377] device hsr_slave_1 entered promiscuous mode [ 2737.203266][T12377] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2737.211097][T12377] Cannot create hsr debugfs directory [ 2737.247512][T12377] bridge0: port 2(bridge_slave_1) entered blocking state [ 2737.254671][T12377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2737.261987][T12377] bridge0: port 1(bridge_slave_0) entered blocking state [ 2737.269034][T12377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2737.300978][T12377] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2737.312384][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2737.322149][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2737.330439][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2737.343549][T12377] 8021q: adding VLAN 0 to HW filter on device team0 [ 2737.353831][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2737.363042][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2737.370195][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2737.388317][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2737.397016][T11867] bridge0: port 2(bridge_slave_1) entered blocking state [ 2737.404035][T11867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2737.413103][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2737.423036][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2737.435669][T12377] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2737.446033][T12377] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2737.458673][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2737.467187][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2737.475630][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2737.490540][T12377] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2737.499651][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2737.507393][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2737.514746][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2737.569092][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2737.629837][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2737.639009][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2737.648104][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2737.656667][T12377] device veth0_vlan entered promiscuous mode [ 2737.665298][T12377] device veth1_vlan entered promiscuous mode [ 2737.673774][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2737.690439][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2737.698892][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2737.709653][T12377] device veth0_macvtap entered promiscuous mode [ 2737.718159][T12377] device veth1_macvtap entered promiscuous mode [ 2737.731027][T12377] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2737.738353][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2737.748399][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2737.759349][T12377] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2737.767448][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2737.841679][T12405] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2737.866254][T12405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2737.877167][T12405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2737.896356][T12405] device bridge_slave_0 left promiscuous mode [ 2737.903057][T12405] bridge0: port 1(bridge_slave_0) entered disabled state [ 2737.918665][T12405] device bridge_slave_1 left promiscuous mode [ 2737.925371][T12405] bridge0: port 2(bridge_slave_1) entered disabled state [ 2737.943641][T12405] bond0: (slave bond_slave_0): Releasing backup interface [ 2737.983065][T12405] bond0: (slave bond_slave_1): Releasing backup interface [ 2738.060208][T12405] team0: Port device team_slave_0 removed [ 2738.107509][T12405] team0: Port device team_slave_1 removed [ 2738.118336][T12405] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2738.125977][T12405] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2738.139398][T12405] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2738.147249][T12405] batman_adv: batadv0: Removing interface: batadv_slave_1 17:22:41 executing program 1: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:41 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000000, {r0}}, 0x58) 17:22:41 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400002f000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:22:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x88480000, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:41 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2020000, {r0}}, 0x58) [ 2738.238517][T12412] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:22:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2040000, {r0}}, 0x58) 17:22:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3000000, {r0}}, 0x58) 17:22:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000000, {r0}}, 0x58) [ 2738.364667][T12413] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:22:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5000000, {r0}}, 0x58) 17:22:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6000000, {r0}}, 0x58) [ 2738.455744][T12413] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2738.475113][T12413] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:42 executing program 1: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6010000, {r0}}, 0x58) [ 2738.689262][T12410] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2738.758537][T12410] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2738.788708][T12410] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400003a000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) [ 2739.110733][T12429] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2739.146094][T12429] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2739.155177][T12429] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2739.309996][T12532] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2739.729028][T14424] device hsr_slave_0 left promiscuous mode [ 2739.735185][T14424] device hsr_slave_1 left promiscuous mode [ 2739.743963][T14424] device veth1_macvtap left promiscuous mode [ 2739.750000][T14424] device veth0_macvtap left promiscuous mode [ 2739.755984][T14424] device veth1_vlan left promiscuous mode [ 2739.761783][T14424] device veth0_vlan left promiscuous mode [ 2739.883656][T14424] bond0 (unregistering): Released all slaves [ 2740.203652][T12634] chnl_net:caif_netlink_parms(): no params data found [ 2740.246181][T12634] bridge0: port 1(bridge_slave_0) entered blocking state [ 2740.253245][T12634] bridge0: port 1(bridge_slave_0) entered disabled state [ 2740.276767][T12634] device bridge_slave_0 entered promiscuous mode [ 2740.283982][T12634] bridge0: port 2(bridge_slave_1) entered blocking state [ 2740.291043][T12634] bridge0: port 2(bridge_slave_1) entered disabled state [ 2740.316799][T12634] device bridge_slave_1 entered promiscuous mode [ 2740.345773][T12634] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2740.357179][T12634] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2740.397612][T12634] team0: Port device team_slave_0 added [ 2740.408300][T12634] team0: Port device team_slave_1 added [ 2740.447385][T12634] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2740.454331][T12634] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2740.480275][T12634] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2740.492551][T12634] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2740.499565][T12634] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2740.525579][T12634] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2740.549863][T12634] device hsr_slave_0 entered promiscuous mode [ 2740.557321][T12634] device hsr_slave_1 entered promiscuous mode [ 2740.563724][T12634] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2740.571383][T12634] Cannot create hsr debugfs directory [ 2740.632284][T12634] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2740.644946][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2740.652827][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2740.662841][T12634] 8021q: adding VLAN 0 to HW filter on device team0 [ 2740.672710][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2740.682328][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2740.690836][ T4467] bridge0: port 1(bridge_slave_0) entered blocking state [ 2740.697905][ T4467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2740.718367][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2740.726490][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2740.735064][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2740.743536][T17104] bridge0: port 2(bridge_slave_1) entered blocking state [ 2740.750569][T17104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2740.758389][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2740.767371][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2740.776475][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2740.785262][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2740.793979][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2740.802284][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2740.811627][T12634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2740.820500][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2740.835408][T12634] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2740.843940][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2740.851812][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2740.907486][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2740.964854][T12634] device veth0_vlan entered promiscuous mode [ 2740.972342][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2740.982540][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2740.990583][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2741.001873][T12634] device veth1_vlan entered promiscuous mode [ 2741.008991][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2741.025008][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2741.033821][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2741.044486][T12634] device veth0_macvtap entered promiscuous mode [ 2741.053202][T12634] device veth1_macvtap entered promiscuous mode [ 2741.066247][T12634] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2741.073545][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2741.083562][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2741.093962][T12634] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2741.101807][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2741.165244][T12662] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2741.186729][T12662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2741.195200][T12662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2741.212731][T12662] device bridge_slave_0 left promiscuous mode [ 2741.219561][T12662] bridge0: port 1(bridge_slave_0) entered disabled state [ 2741.237528][T12662] device bridge_slave_1 left promiscuous mode [ 2741.244218][T12662] bridge0: port 2(bridge_slave_1) entered disabled state [ 2741.261171][T12662] bond0: (slave bond_slave_0): Releasing backup interface [ 2741.296338][T12662] bond0: (slave bond_slave_1): Releasing backup interface [ 2741.372063][T12662] team0: Port device team_slave_0 removed [ 2741.428874][T12662] team0: Port device team_slave_1 removed [ 2741.440647][T12662] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2741.448477][T12662] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2741.464824][T12662] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2741.472738][T12662] batman_adv: batadv0: Removing interface: batadv_slave_1 17:22:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6040000, {r0}}, 0x58) 17:22:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x88a8ffff, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104003f3b000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:22:45 executing program 1: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7000000, {r0}}, 0x58) [ 2741.632531][T12664] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:22:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000, {r0}}, 0x58) [ 2741.677234][T12664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2741.693573][T12664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8030000, {r0}}, 0x58) 17:22:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9000000, {r0}}, 0x58) 17:22:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa000000, {r0}}, 0x58) 17:22:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x9effffff, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2741.951520][T12668] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2742.041139][T12670] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2742.083630][T12670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2742.100975][T12670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2742.310490][T12684] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2742.358407][T12684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2742.367284][T12684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa010000, {r0}}, 0x58) 17:22:46 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2742.571972][T12787] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2742.604725][T12787] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2742.613624][T12787] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2743.138175][T30727] device hsr_slave_0 left promiscuous mode [ 2743.144428][T30727] device hsr_slave_1 left promiscuous mode [ 2743.154892][T30727] device veth1_macvtap left promiscuous mode [ 2743.160959][T30727] device veth0_macvtap left promiscuous mode [ 2743.166991][T30727] device veth1_vlan left promiscuous mode [ 2743.172740][T30727] device veth0_vlan left promiscuous mode [ 2743.295603][T30727] bond0 (unregistering): Released all slaves [ 2743.584378][T12791] chnl_net:caif_netlink_parms(): no params data found [ 2743.619712][T12791] bridge0: port 1(bridge_slave_0) entered blocking state [ 2743.626902][T12791] bridge0: port 1(bridge_slave_0) entered disabled state [ 2743.634926][T12791] device bridge_slave_0 entered promiscuous mode [ 2743.642457][T12791] bridge0: port 2(bridge_slave_1) entered blocking state [ 2743.649557][T12791] bridge0: port 2(bridge_slave_1) entered disabled state [ 2743.657427][T12791] device bridge_slave_1 entered promiscuous mode [ 2743.688488][T12791] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2743.698808][T12791] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2743.746346][T12791] team0: Port device team_slave_0 added [ 2743.752840][T12791] team0: Port device team_slave_1 added [ 2743.782654][T12791] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2743.789865][T12791] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2743.815951][T12791] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2743.830666][T12791] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2743.837622][T12791] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2743.863624][T12791] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2743.904148][T12791] device hsr_slave_0 entered promiscuous mode [ 2743.910754][T12791] device hsr_slave_1 entered promiscuous mode [ 2743.917499][T12791] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2743.925037][T12791] Cannot create hsr debugfs directory [ 2743.992086][T12791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2744.002991][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2744.012171][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2744.021371][T12791] 8021q: adding VLAN 0 to HW filter on device team0 [ 2744.031890][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2744.040738][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2744.050044][ T1924] bridge0: port 1(bridge_slave_0) entered blocking state [ 2744.057082][ T1924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2744.075626][T12791] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2744.086157][T12791] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2744.099819][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2744.108117][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2744.118194][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2744.126668][ T7648] bridge0: port 2(bridge_slave_1) entered blocking state [ 2744.133766][ T7648] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2744.142345][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2744.151046][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2744.160792][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2744.169360][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2744.179269][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2744.187748][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2744.197645][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2744.206346][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2744.214829][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2744.223399][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2744.236432][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2744.243841][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2744.253046][T12791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2744.313577][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2744.370197][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2744.379232][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2744.388008][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2744.396692][T12791] device veth0_vlan entered promiscuous mode [ 2744.405219][T12791] device veth1_vlan entered promiscuous mode [ 2744.413584][T13230] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2744.428392][T13230] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2744.437081][T13230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2744.446986][T12791] device veth0_macvtap entered promiscuous mode [ 2744.454934][T12791] device veth1_macvtap entered promiscuous mode [ 2744.469067][T12791] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2744.476484][T13230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2744.486367][T13230] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2744.496899][T12791] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2744.507178][T13230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2744.578684][T12819] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2744.604341][T12819] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2744.613087][T12819] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2744.634190][T12819] device bridge_slave_0 left promiscuous mode [ 2744.641147][T12819] bridge0: port 1(bridge_slave_0) entered disabled state [ 2744.658549][T12819] device bridge_slave_1 left promiscuous mode [ 2744.665545][T12819] bridge0: port 2(bridge_slave_1) entered disabled state [ 2744.686627][T12819] bond0: (slave bond_slave_0): Releasing backup interface [ 2744.725587][T12819] bond0: (slave bond_slave_1): Releasing backup interface [ 2744.812926][T12819] team0: Port device team_slave_0 removed [ 2744.870218][T12819] team0: Port device team_slave_1 removed [ 2744.883344][T12819] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2744.891614][T12819] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2744.909582][T12819] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2744.917580][T12819] batman_adv: batadv0: Removing interface: batadv_slave_1 17:22:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400003f000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:22:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb000000, {r0}}, 0x58) 17:22:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xc3ffffff, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:48 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc000000, {r0}}, 0x58) 17:22:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd000000, {r0}}, 0x58) [ 2745.114061][T12824] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:22:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe000000, {r0}}, 0x58) [ 2745.176855][T12824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2745.192972][T12824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf000000, {r0}}, 0x58) 17:22:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000000, {r0}}, 0x58) 17:22:49 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2745.360220][T12827] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2745.460645][T12825] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2745.524521][T12825] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2745.536898][T12825] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2745.809643][T12839] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2745.843313][T12839] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2745.852078][T12839] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10010000, {r0}}, 0x58) [ 2745.968324][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2745.979886][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2746.001267][T12841] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2746.469284][T14424] device hsr_slave_0 left promiscuous mode [ 2746.475436][T14424] device hsr_slave_1 left promiscuous mode [ 2746.485002][T14424] device veth1_macvtap left promiscuous mode [ 2746.491103][T14424] device veth0_macvtap left promiscuous mode [ 2746.497163][T14424] device veth1_vlan left promiscuous mode [ 2746.502884][T14424] device veth0_vlan left promiscuous mode [ 2746.625292][T14424] bond0 (unregistering): Released all slaves [ 2746.990146][T12945] chnl_net:caif_netlink_parms(): no params data found [ 2747.057791][T12945] bridge0: port 1(bridge_slave_0) entered blocking state [ 2747.064839][T12945] bridge0: port 1(bridge_slave_0) entered disabled state [ 2747.086748][T12945] device bridge_slave_0 entered promiscuous mode [ 2747.106700][T12945] bridge0: port 2(bridge_slave_1) entered blocking state [ 2747.113897][T12945] bridge0: port 2(bridge_slave_1) entered disabled state [ 2747.123065][T12945] device bridge_slave_1 entered promiscuous mode [ 2747.142374][T12945] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2747.152799][T12945] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2747.177299][T12945] team0: Port device team_slave_0 added [ 2747.183721][T12945] team0: Port device team_slave_1 added [ 2747.218497][T12945] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2747.225444][T12945] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2747.251547][T12945] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2747.263001][T12945] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2747.270003][T12945] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2747.296087][T12945] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2747.319783][T12945] device hsr_slave_0 entered promiscuous mode [ 2747.326538][T12945] device hsr_slave_1 entered promiscuous mode [ 2747.332908][T12945] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2747.342719][T12945] Cannot create hsr debugfs directory [ 2747.403971][T12945] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2747.416390][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2747.427401][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2747.435174][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2747.444497][T12945] 8021q: adding VLAN 0 to HW filter on device team0 [ 2747.455008][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2747.464111][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2747.473626][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2747.480702][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2747.497190][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2747.505216][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2747.514867][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2747.523194][T16602] bridge0: port 2(bridge_slave_1) entered blocking state [ 2747.530228][T16602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2747.540079][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2747.548625][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2747.561763][T12945] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2747.572116][T12945] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2747.585424][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2747.593689][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2747.602344][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2747.616690][T12945] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2747.625525][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2747.633482][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2747.642025][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2747.690447][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2747.752910][T12945] device veth0_vlan entered promiscuous mode [ 2747.761128][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2747.770021][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2747.778652][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2747.788360][T12945] device veth1_vlan entered promiscuous mode [ 2747.796929][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2747.804955][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2747.818440][T12945] device veth0_macvtap entered promiscuous mode [ 2747.827086][T12945] device veth1_macvtap entered promiscuous mode [ 2747.835038][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2747.843877][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2747.857026][T12945] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2747.866813][T12945] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2747.874236][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2747.883777][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2747.952072][T12973] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2747.975976][T12973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2747.984835][T12973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2748.003023][T12973] device bridge_slave_0 left promiscuous mode [ 2748.009783][T12973] bridge0: port 1(bridge_slave_0) entered disabled state [ 2748.025846][T12973] device bridge_slave_1 left promiscuous mode [ 2748.032959][T12973] bridge0: port 2(bridge_slave_1) entered disabled state [ 2748.051330][T12973] bond0: (slave bond_slave_0): Releasing backup interface [ 2748.088287][T12973] bond0: (slave bond_slave_1): Releasing backup interface [ 2748.163924][T12973] team0: Port device team_slave_0 removed [ 2748.211810][T12973] team0: Port device team_slave_1 removed [ 2748.222597][T12973] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2748.230507][T12973] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2748.244720][T12973] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2748.252548][T12973] batman_adv: batadv0: Removing interface: batadv_slave_1 17:22:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xc4050000, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10030000, {r0}}, 0x58) 17:22:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104003b3f000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:22:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11000000, {r0}}, 0x58) [ 2748.328278][T12975] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2748.390217][T12981] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2748.425452][T12981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:22:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x12000000, {r0}}, 0x58) 17:22:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x14000000, {r0}}, 0x58) [ 2748.453410][T12981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x14030000, {r0}}, 0x58) 17:22:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x16000000, {r0}}, 0x58) 17:22:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x16020000, {r0}}, 0x58) [ 2748.796781][T12979] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2748.861326][T12979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2748.888115][T12979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x18020000, {r0}}, 0x58) [ 2749.193528][T12992] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2749.205238][T12992] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2749.212813][T12992] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2749.250386][T12975] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:22:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000040000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:22:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1a010000, {r0}}, 0x58) [ 2749.354189][T13002] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2749.412772][T13000] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2749.445184][T13000] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2749.454977][T13000] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2749.587343][T13002] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2749.918338][T30727] device hsr_slave_0 left promiscuous mode [ 2749.924608][T30727] device hsr_slave_1 left promiscuous mode [ 2749.934439][T30727] device veth1_macvtap left promiscuous mode [ 2749.940488][T30727] device veth0_macvtap left promiscuous mode [ 2749.946584][T30727] device veth1_vlan left promiscuous mode [ 2749.952327][T30727] device veth0_vlan left promiscuous mode [ 2750.079466][T30727] bond0 (unregistering): Released all slaves [ 2750.339588][T13004] chnl_net:caif_netlink_parms(): no params data found [ 2750.373560][T13004] bridge0: port 1(bridge_slave_0) entered blocking state [ 2750.380669][T13004] bridge0: port 1(bridge_slave_0) entered disabled state [ 2750.388400][T13004] device bridge_slave_0 entered promiscuous mode [ 2750.397330][T13004] bridge0: port 2(bridge_slave_1) entered blocking state [ 2750.404345][T13004] bridge0: port 2(bridge_slave_1) entered disabled state [ 2750.412210][T13004] device bridge_slave_1 entered promiscuous mode [ 2750.431882][T13004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2750.443531][T13004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2750.463452][T13004] team0: Port device team_slave_0 added [ 2750.477961][T13004] team0: Port device team_slave_1 added [ 2750.517084][T13004] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2750.524081][T13004] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2750.550079][T13004] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2750.587905][T13004] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2750.594853][T13004] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2750.620826][T13004] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2750.679030][T13004] device hsr_slave_0 entered promiscuous mode [ 2750.687181][T13004] device hsr_slave_1 entered promiscuous mode [ 2750.693690][T13004] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2750.702507][T13004] Cannot create hsr debugfs directory [ 2750.739015][T13004] bridge0: port 2(bridge_slave_1) entered blocking state [ 2750.746134][T13004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2750.753482][T13004] bridge0: port 1(bridge_slave_0) entered blocking state [ 2750.760533][T13004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2750.794074][T13004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2750.805532][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2750.814313][T17104] bridge0: port 1(bridge_slave_0) entered disabled state [ 2750.823630][T17104] bridge0: port 2(bridge_slave_1) entered disabled state [ 2750.832780][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2750.844825][T13004] 8021q: adding VLAN 0 to HW filter on device team0 [ 2750.855268][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2750.865061][T28225] bridge0: port 1(bridge_slave_0) entered blocking state [ 2750.872108][T28225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2750.888642][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2750.897973][T17104] bridge0: port 2(bridge_slave_1) entered blocking state [ 2750.905191][T17104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2750.914248][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2750.928630][T13004] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2750.939080][T13004] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2750.951898][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2750.960222][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2750.968884][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2750.977612][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2750.992742][T13004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2751.002138][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2751.009828][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2751.017464][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2751.075028][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2751.135469][T13004] device veth0_vlan entered promiscuous mode [ 2751.143379][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2751.152742][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2751.161346][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2751.171222][T13004] device veth1_vlan entered promiscuous mode [ 2751.178531][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2751.193058][T13004] device veth0_macvtap entered promiscuous mode [ 2751.200765][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2751.209304][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2751.217862][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2751.226932][T13004] device veth1_macvtap entered promiscuous mode [ 2751.240444][T13004] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2751.248620][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2751.259004][T13004] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2751.266573][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2751.331528][T13032] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2751.353506][T13032] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2751.362912][T13032] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2751.381221][T13032] device bridge_slave_0 left promiscuous mode [ 2751.388149][T13032] bridge0: port 1(bridge_slave_0) entered disabled state [ 2751.403736][T13032] device bridge_slave_1 left promiscuous mode [ 2751.410576][T13032] bridge0: port 2(bridge_slave_1) entered disabled state [ 2751.429193][T13032] bond0: (slave bond_slave_0): Releasing backup interface [ 2751.466504][T13032] bond0: (slave bond_slave_1): Releasing backup interface [ 2751.543391][T13032] team0: Port device team_slave_0 removed [ 2751.592920][T13032] team0: Port device team_slave_1 removed [ 2751.603530][T13032] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2751.611360][T13032] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2751.625031][T13032] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2751.632751][T13032] batman_adv: batadv0: Removing interface: batadv_slave_1 17:22:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1a020000, {r0}}, 0x58) 17:22:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000044000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:22:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xeaffffff, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1eae0000, {r0}}, 0x58) 17:22:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f000000, {r0}}, 0x58) [ 2751.815932][T13038] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:22:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20000000, {r0}}, 0x58) [ 2751.878335][T13038] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2751.900178][T13038] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20020000, {r0}}, 0x58) 17:22:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x21000000, {r0}}, 0x58) 17:22:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x22000000, {r0}}, 0x58) [ 2752.160978][T13040] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2752.265103][T13039] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2752.337163][T13039] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2752.345672][T13039] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2753.078281][T14432] device hsr_slave_0 left promiscuous mode [ 2753.084778][T14432] device hsr_slave_1 left promiscuous mode [ 2753.094720][T14432] device veth1_macvtap left promiscuous mode [ 2753.100771][T14432] device veth0_macvtap left promiscuous mode [ 2753.107015][T14432] device veth1_vlan left promiscuous mode [ 2753.112845][T14432] device veth0_vlan left promiscuous mode [ 2753.232316][T14432] bond0 (unregistering): Released all slaves [ 2753.799969][T13157] chnl_net:caif_netlink_parms(): no params data found [ 2753.841933][T13157] bridge0: port 1(bridge_slave_0) entered blocking state [ 2753.849014][T13157] bridge0: port 1(bridge_slave_0) entered disabled state [ 2753.858032][T13157] device bridge_slave_0 entered promiscuous mode [ 2753.865762][T13157] bridge0: port 2(bridge_slave_1) entered blocking state [ 2753.872838][T13157] bridge0: port 2(bridge_slave_1) entered disabled state [ 2753.881596][T13157] device bridge_slave_1 entered promiscuous mode [ 2753.900261][T13157] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2753.910775][T13157] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2753.930758][T13157] team0: Port device team_slave_0 added [ 2753.937969][T13157] team0: Port device team_slave_1 added [ 2753.953395][T13157] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2753.960394][T13157] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2753.986337][T13157] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2753.998312][T13157] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2754.005326][T13157] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2754.031329][T13157] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2754.057065][T13157] device hsr_slave_0 entered promiscuous mode [ 2754.063685][T13157] device hsr_slave_1 entered promiscuous mode [ 2754.070919][T13157] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2754.078546][T13157] Cannot create hsr debugfs directory [ 2754.116159][T13157] bridge0: port 2(bridge_slave_1) entered blocking state [ 2754.123257][T13157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2754.130551][T13157] bridge0: port 1(bridge_slave_0) entered blocking state [ 2754.137584][T13157] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2754.171870][T13157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2754.183860][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2754.192765][T17104] bridge0: port 1(bridge_slave_0) entered disabled state [ 2754.202002][T17104] bridge0: port 2(bridge_slave_1) entered disabled state [ 2754.214013][T13157] 8021q: adding VLAN 0 to HW filter on device team0 [ 2754.225848][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2754.234482][ T4467] bridge0: port 1(bridge_slave_0) entered blocking state [ 2754.241528][ T4467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2754.259152][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2754.268639][T17104] bridge0: port 2(bridge_slave_1) entered blocking state [ 2754.275740][T17104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2754.285436][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2754.300675][T13157] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2754.311069][T13157] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2754.324194][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2754.332486][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2754.341532][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2754.350136][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2754.364620][T13157] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2754.373936][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2754.381721][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2754.389287][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2754.444438][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2754.505467][T13157] device veth0_vlan entered promiscuous mode [ 2754.512785][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2754.522690][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2754.530440][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2754.541577][T13157] device veth1_vlan entered promiscuous mode [ 2754.548553][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2754.564365][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2754.572901][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2754.583187][T13157] device veth0_macvtap entered promiscuous mode [ 2754.592566][T13157] device veth1_macvtap entered promiscuous mode [ 2754.604548][T13157] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2754.611938][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2754.621733][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2754.632223][T13157] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2754.640040][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2754.703419][T13185] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2754.724383][T13185] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2754.733514][T13185] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2754.752381][T13185] device bridge_slave_0 left promiscuous mode [ 2754.759322][T13185] bridge0: port 1(bridge_slave_0) entered disabled state [ 2754.773980][T13185] device bridge_slave_1 left promiscuous mode [ 2754.780516][T13185] bridge0: port 2(bridge_slave_1) entered disabled state [ 2754.798270][T13185] bond0: (slave bond_slave_0): Releasing backup interface [ 2754.835870][T13185] bond0: (slave bond_slave_1): Releasing backup interface [ 2754.911440][T13185] team0: Port device team_slave_0 removed [ 2754.958303][T13185] team0: Port device team_slave_1 removed [ 2754.969169][T13185] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2754.977107][T13185] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2754.990767][T13185] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2754.998527][T13185] batman_adv: batadv0: Removing interface: batadv_slave_1 17:22:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x24000000, {r0}}, 0x58) 17:22:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xefffffff, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104008847000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:22:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x24010000, {r0}}, 0x58) 17:22:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x25000000, {r0}}, 0x58) [ 2755.164901][T13188] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:22:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x25030000, {r0}}, 0x58) 17:22:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x26000000, {r0}}, 0x58) [ 2755.224852][T13188] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2755.260014][T13188] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x26010000, {r0}}, 0x58) 17:22:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x26030000, {r0}}, 0x58) 17:22:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x28000000, {r0}}, 0x58) [ 2755.504126][T13190] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2755.619554][T13193] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2755.677729][T13193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2755.699919][T13193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:22:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xf0ffffff, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:22:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2a000000, {r0}}, 0x58) [ 2755.941849][T13208] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2755.954369][T13208] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2755.963450][T13208] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2756.084981][T13314] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2756.115969][T13314] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2756.124465][T13314] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2756.248300][T13315] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2756.261394][T13315] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2756.269310][T13315] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2756.578274][T30727] device hsr_slave_0 left promiscuous mode [ 2756.584469][T30727] device hsr_slave_1 left promiscuous mode [ 2756.593354][T30727] device veth1_macvtap left promiscuous mode [ 2756.599403][T30727] device veth0_macvtap left promiscuous mode [ 2756.605433][T30727] device veth1_vlan left promiscuous mode [ 2756.611199][T30727] device veth0_vlan left promiscuous mode [ 2756.732136][T30727] bond0 (unregistering): Released all slaves [ 2757.068158][T13317] chnl_net:caif_netlink_parms(): no params data found [ 2757.157812][T13317] bridge0: port 1(bridge_slave_0) entered blocking state [ 2757.164878][T13317] bridge0: port 1(bridge_slave_0) entered disabled state [ 2757.187933][T13317] device bridge_slave_0 entered promiscuous mode [ 2757.207613][T13317] bridge0: port 2(bridge_slave_1) entered blocking state [ 2757.214728][T13317] bridge0: port 2(bridge_slave_1) entered disabled state [ 2757.236641][T13317] device bridge_slave_1 entered promiscuous mode [ 2757.278002][T13317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2757.293363][T13317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2757.334833][T13317] team0: Port device team_slave_0 added [ 2757.355068][T13317] team0: Port device team_slave_1 added [ 2757.381127][T13317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2757.388161][T13317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2757.414155][T13317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2757.425604][T13317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2757.432588][T13317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2757.458604][T13317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2757.482522][T13317] device hsr_slave_0 entered promiscuous mode [ 2757.490072][T13317] device hsr_slave_1 entered promiscuous mode [ 2757.496677][T13317] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2757.504234][T13317] Cannot create hsr debugfs directory [ 2757.565050][T13317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2757.577141][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2757.584809][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2757.593733][T13317] 8021q: adding VLAN 0 to HW filter on device team0 [ 2757.603548][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2757.612307][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2757.620727][T28225] bridge0: port 1(bridge_slave_0) entered blocking state [ 2757.627873][T28225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2757.648942][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2757.657112][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2757.665872][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2757.674583][ T4467] bridge0: port 2(bridge_slave_1) entered blocking state [ 2757.681757][ T4467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2757.689831][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2757.698835][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2757.707769][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2757.716535][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2757.725448][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2757.733858][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2757.743131][T13317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2757.751940][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2757.766726][T13317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2757.775036][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2757.782892][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2757.841932][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2757.902734][T13317] device veth0_vlan entered promiscuous mode [ 2757.909892][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2757.920030][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2757.927859][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2757.938112][T13317] device veth1_vlan entered promiscuous mode [ 2757.948091][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2757.956307][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2757.970458][T13317] device veth0_macvtap entered promiscuous mode [ 2757.978656][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2757.988619][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2757.998320][T13317] device veth1_macvtap entered promiscuous mode [ 2758.012833][T13317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2758.020907][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2758.032732][T13317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2758.040458][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2758.115472][T13345] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2758.141437][T13345] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2758.150994][T13345] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2758.172139][T13345] device bridge_slave_0 left promiscuous mode [ 2758.179056][T13345] bridge0: port 1(bridge_slave_0) entered disabled state [ 2758.197879][T13345] device bridge_slave_1 left promiscuous mode [ 2758.204866][T13345] bridge0: port 2(bridge_slave_1) entered disabled state [ 2758.225538][T13345] bond0: (slave bond_slave_0): Releasing backup interface [ 2758.265491][T13345] bond0: (slave bond_slave_1): Releasing backup interface [ 2758.350988][T13345] team0: Port device team_slave_0 removed [ 2758.404404][T13345] team0: Port device team_slave_1 removed [ 2758.416044][T13345] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2758.424081][T13345] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2758.441083][T13345] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2758.449013][T13345] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2a020000, {r0}}, 0x58) 17:23:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000048000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xfeffffff, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2a030000, {r0}}, 0x58) [ 2758.615622][T13347] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2c020000, {r0}}, 0x58) [ 2758.666649][T13347] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2758.684592][T13347] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2c030000, {r0}}, 0x58) 17:23:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2e010000, {r0}}, 0x58) 17:23:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2e030000, {r0}}, 0x58) [ 2758.929178][T13353] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2759.027908][T13351] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2759.086092][T13351] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2759.104278][T13351] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2759.357628][T13365] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2759.385109][T13365] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2759.395235][T13365] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2f000000, {r0}}, 0x58) [ 2759.505208][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2759.531548][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2759.544099][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2760.107851][T30727] device hsr_slave_0 left promiscuous mode [ 2760.114068][T30727] device hsr_slave_1 left promiscuous mode [ 2760.123001][T30727] device veth1_macvtap left promiscuous mode [ 2760.129133][T30727] device veth0_macvtap left promiscuous mode [ 2760.135166][T30727] device veth1_vlan left promiscuous mode [ 2760.140983][T30727] device veth0_vlan left promiscuous mode [ 2760.261813][T30727] bond0 (unregistering): Released all slaves [ 2760.562659][T13471] chnl_net:caif_netlink_parms(): no params data found [ 2760.599868][T13471] bridge0: port 1(bridge_slave_0) entered blocking state [ 2760.607036][T13471] bridge0: port 1(bridge_slave_0) entered disabled state [ 2760.614688][T13471] device bridge_slave_0 entered promiscuous mode [ 2760.621989][T13471] bridge0: port 2(bridge_slave_1) entered blocking state [ 2760.629052][T13471] bridge0: port 2(bridge_slave_1) entered disabled state [ 2760.636760][T13471] device bridge_slave_1 entered promiscuous mode [ 2760.653448][T13471] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2760.663888][T13471] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2760.682539][T13471] team0: Port device team_slave_0 added [ 2760.697000][T13471] team0: Port device team_slave_1 added [ 2760.726798][T13471] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2760.733758][T13471] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2760.759717][T13471] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2760.770999][T13471] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2760.778002][T13471] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2760.803890][T13471] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2760.826800][T13471] device hsr_slave_0 entered promiscuous mode [ 2760.833383][T13471] device hsr_slave_1 entered promiscuous mode [ 2760.839925][T13471] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2760.847519][T13471] Cannot create hsr debugfs directory [ 2760.935815][T13471] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2760.946532][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2760.956705][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2760.964288][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2760.973161][T13471] 8021q: adding VLAN 0 to HW filter on device team0 [ 2760.983349][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2760.992623][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2761.002053][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2761.009098][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2761.028735][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2761.036960][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2761.045506][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2761.054471][T28225] bridge0: port 2(bridge_slave_1) entered blocking state [ 2761.061571][T28225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2761.070606][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2761.079333][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2761.088168][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2761.099044][T13471] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2761.110785][T13471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2761.119705][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2761.128330][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2761.143213][T13471] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2761.152549][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2761.160343][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2761.214586][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2761.273060][T13471] device veth0_vlan entered promiscuous mode [ 2761.281158][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2761.290216][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2761.298982][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2761.309052][T13471] device veth1_vlan entered promiscuous mode [ 2761.318480][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2761.326783][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2761.340012][T13471] device veth0_macvtap entered promiscuous mode [ 2761.350589][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2761.359664][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2761.368652][T13471] device veth1_macvtap entered promiscuous mode [ 2761.382005][T13471] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2761.389474][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2761.401011][T13471] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2761.408777][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2761.473780][T13500] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2761.494668][T13500] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2761.504548][T13500] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2761.524615][T13500] device bridge_slave_0 left promiscuous mode [ 2761.531419][T13500] bridge0: port 1(bridge_slave_0) entered disabled state [ 2761.546541][T13500] device bridge_slave_1 left promiscuous mode [ 2761.553039][T13500] bridge0: port 2(bridge_slave_1) entered disabled state [ 2761.571525][T13500] bond0: (slave bond_slave_0): Releasing backup interface [ 2761.610351][T13500] bond0: (slave bond_slave_1): Releasing backup interface [ 2761.691113][T13500] team0: Port device team_slave_0 removed [ 2761.740979][T13500] team0: Port device team_slave_1 removed [ 2761.752931][T13500] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2761.760661][T13500] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2761.774331][T13500] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2761.782181][T13500] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104008848000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xffffa888, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2f010000, {r0}}, 0x58) 17:23:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x30000000, {r0}}, 0x58) [ 2761.876583][T13508] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x30020000, {r0}}, 0x58) [ 2762.000730][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x31010000, {r0}}, 0x58) 17:23:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x34020000, {r0}}, 0x58) [ 2762.072994][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2762.095105][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x36000000, {r0}}, 0x58) 17:23:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x36030000, {r0}}, 0x58) [ 2762.351801][T13509] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2762.399387][T13509] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2762.414431][T13509] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2762.644071][T13508] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2762.665625][T13523] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2762.677724][T13523] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2762.685181][T13523] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x38000000, {r0}}, 0x58) 17:23:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400004a000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xffffff7f, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2762.753204][T13525] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2762.821863][T13529] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2762.851975][T13529] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2762.860827][T13529] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2763.002859][T13545] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2763.015853][T13545] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2763.023735][T13545] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2763.427974][T14424] device hsr_slave_0 left promiscuous mode [ 2763.434319][T14424] device hsr_slave_1 left promiscuous mode [ 2763.444027][T14424] device veth1_macvtap left promiscuous mode [ 2763.450133][T14424] device veth0_macvtap left promiscuous mode [ 2763.456128][T14424] device veth1_vlan left promiscuous mode [ 2763.461928][T14424] device veth0_vlan left promiscuous mode [ 2763.584654][T14424] bond0 (unregistering): Released all slaves [ 2763.860247][T13633] chnl_net:caif_netlink_parms(): no params data found [ 2763.895248][T13633] bridge0: port 1(bridge_slave_0) entered blocking state [ 2763.902321][T13633] bridge0: port 1(bridge_slave_0) entered disabled state [ 2763.910928][T13633] device bridge_slave_0 entered promiscuous mode [ 2763.918431][T13633] bridge0: port 2(bridge_slave_1) entered blocking state [ 2763.925505][T13633] bridge0: port 2(bridge_slave_1) entered disabled state [ 2763.934500][T13633] device bridge_slave_1 entered promiscuous mode [ 2763.961826][T13633] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2763.988810][T13633] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2764.032341][T13633] team0: Port device team_slave_0 added [ 2764.047994][T13633] team0: Port device team_slave_1 added [ 2764.077018][T13633] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2764.083962][T13633] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2764.110142][T13633] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2764.136609][T13633] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2764.143744][T13633] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2764.169666][T13633] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2764.215418][T13633] device hsr_slave_0 entered promiscuous mode [ 2764.222917][T13633] device hsr_slave_1 entered promiscuous mode [ 2764.229474][T13633] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2764.238031][T13633] Cannot create hsr debugfs directory [ 2764.297832][T13633] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2764.309296][T13633] 8021q: adding VLAN 0 to HW filter on device team0 [ 2764.319648][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2764.327601][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2764.347202][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2764.355759][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2764.364200][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2764.371273][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2764.379053][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2764.387731][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2764.396048][T16602] bridge0: port 2(bridge_slave_1) entered blocking state [ 2764.403085][T16602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2764.410837][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2764.419647][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2764.428466][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2764.437358][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2764.446441][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2764.456886][T13633] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2764.469114][T13633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2764.476895][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2764.484978][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2764.493848][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2764.508312][T13633] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2764.515865][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2764.530078][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2764.582465][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2764.640120][T13633] device veth0_vlan entered promiscuous mode [ 2764.647413][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2764.656105][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2764.664907][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2764.675016][T13633] device veth1_vlan entered promiscuous mode [ 2764.682832][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2764.697561][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2764.706049][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2764.715550][T13633] device veth0_macvtap entered promiscuous mode [ 2764.724387][T13633] device veth1_macvtap entered promiscuous mode [ 2764.737773][T13633] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2764.745002][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2764.755083][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2764.765582][T13633] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2764.773386][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2764.833547][T13661] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2764.855911][T13661] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2764.866314][T13661] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2764.886606][T13661] device bridge_slave_0 left promiscuous mode [ 2764.893321][T13661] bridge0: port 1(bridge_slave_0) entered disabled state [ 2764.909996][T13661] device bridge_slave_1 left promiscuous mode [ 2764.916896][T13661] bridge0: port 2(bridge_slave_1) entered disabled state [ 2764.935265][T13661] bond0: (slave bond_slave_0): Releasing backup interface [ 2764.972982][T13661] bond0: (slave bond_slave_1): Releasing backup interface [ 2765.056099][T13661] team0: Port device team_slave_0 removed [ 2765.110129][T13661] team0: Port device team_slave_1 removed [ 2765.120836][T13661] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2765.128746][T13661] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2765.142796][T13661] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2765.150716][T13661] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400004c000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:08 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3a000000, {r0}}, 0x58) 17:23:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xffffff81, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:09 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3a010000, {r0}}, 0x58) [ 2765.300789][T13667] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:09 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3a020000, {r0}}, 0x58) [ 2765.355767][T13667] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2765.379487][T13667] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:09 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3a030000, {r0}}, 0x58) 17:23:09 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f000000, {r0}}, 0x58) 17:23:09 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x40000000, {r0}}, 0x58) 17:23:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2765.565396][T13668] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2765.697327][T13664] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2765.787333][T13664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2765.816181][T13664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2766.125056][T13681] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2766.155315][T13681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2766.164303][T13681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x40030000, {r0}}, 0x58) [ 2766.282120][T13682] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2766.294349][T13682] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2766.302317][T13682] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2766.828050][T14432] device hsr_slave_0 left promiscuous mode [ 2766.834128][T14432] device hsr_slave_1 left promiscuous mode [ 2766.842841][T14432] device veth1_macvtap left promiscuous mode [ 2766.848880][T14432] device veth0_macvtap left promiscuous mode [ 2766.854871][T14432] device veth1_vlan left promiscuous mode [ 2766.860662][T14432] device veth0_vlan left promiscuous mode [ 2766.988913][T14432] bond0 (unregistering): Released all slaves [ 2767.251643][T13786] chnl_net:caif_netlink_parms(): no params data found [ 2767.289210][T13786] bridge0: port 1(bridge_slave_0) entered blocking state [ 2767.296392][T13786] bridge0: port 1(bridge_slave_0) entered disabled state [ 2767.305302][T13786] device bridge_slave_0 entered promiscuous mode [ 2767.326344][T13786] bridge0: port 2(bridge_slave_1) entered blocking state [ 2767.333380][T13786] bridge0: port 2(bridge_slave_1) entered disabled state [ 2767.356758][T13786] device bridge_slave_1 entered promiscuous mode [ 2767.399108][T13786] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2767.409467][T13786] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2767.460127][T13786] team0: Port device team_slave_0 added [ 2767.476468][T13786] team0: Port device team_slave_1 added [ 2767.501724][T13786] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2767.508702][T13786] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2767.534604][T13786] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2767.571840][T13786] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2767.578872][T13786] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2767.604885][T13786] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2767.627774][T13786] device hsr_slave_0 entered promiscuous mode [ 2767.634246][T13786] device hsr_slave_1 entered promiscuous mode [ 2767.640988][T13786] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2767.648624][T13786] Cannot create hsr debugfs directory [ 2767.706604][T13786] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2767.717974][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2767.727550][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2767.735244][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2767.745352][T13786] 8021q: adding VLAN 0 to HW filter on device team0 [ 2767.755032][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2767.764682][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2767.773047][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2767.780164][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2767.796815][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2767.804660][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2767.813307][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2767.821737][T16602] bridge0: port 2(bridge_slave_1) entered blocking state [ 2767.828897][T16602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2767.836937][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2767.846106][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2767.855454][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2767.864208][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2767.876684][T13786] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2767.887114][T13786] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2767.900230][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2767.908298][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2767.916843][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2767.930962][T13786] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2767.940116][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2767.948001][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2767.955368][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2768.011054][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2768.071998][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2768.080915][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2768.089789][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2768.098368][T13786] device veth0_vlan entered promiscuous mode [ 2768.109813][T13786] device veth1_vlan entered promiscuous mode [ 2768.122461][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2768.131810][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2768.140399][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2768.151347][T13786] device veth0_macvtap entered promiscuous mode [ 2768.160264][T13786] device veth1_macvtap entered promiscuous mode [ 2768.173528][T13786] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2768.180962][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2768.192379][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2768.203278][T13786] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2768.211147][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2768.276091][T13814] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2768.298707][T13814] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2768.307554][T13814] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2768.325007][T13814] device bridge_slave_0 left promiscuous mode [ 2768.331779][T13814] bridge0: port 1(bridge_slave_0) entered disabled state [ 2768.346725][T13814] device bridge_slave_1 left promiscuous mode [ 2768.353252][T13814] bridge0: port 2(bridge_slave_1) entered disabled state [ 2768.371106][T13814] bond0: (slave bond_slave_0): Releasing backup interface [ 2768.406936][T13814] bond0: (slave bond_slave_1): Releasing backup interface [ 2768.483872][T13814] team0: Port device team_slave_0 removed [ 2768.531921][T13814] team0: Port device team_slave_1 removed [ 2768.543360][T13814] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2768.551521][T13814] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2768.567709][T13814] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2768.575535][T13814] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104006558000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xffffff9e, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x41000000, {r0}}, 0x58) 17:23:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x42030000, {r0}}, 0x58) 17:23:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x44000000, {r0}}, 0x58) 17:23:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x44010000, {r0}}, 0x58) [ 2768.807052][T13816] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x46000000, {r0}}, 0x58) [ 2768.868001][T13816] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2768.881902][T13816] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x46030000, {r0}}, 0x58) 17:23:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x48000000, {r0}}, 0x58) [ 2769.161558][T13821] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2769.246633][T13822] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2769.301280][T13822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2769.320298][T13822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2769.550451][T13835] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2769.561993][T13835] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2769.569996][T13835] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4a000000, {r0}}, 0x58) 17:23:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400035c000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2769.706563][T13941] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2769.738080][T13941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2769.746585][T13941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2769.850006][T13939] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2770.279412][T14432] device hsr_slave_0 left promiscuous mode [ 2770.285624][T14432] device hsr_slave_1 left promiscuous mode [ 2770.294621][T14432] device veth1_macvtap left promiscuous mode [ 2770.300639][T14432] device veth0_macvtap left promiscuous mode [ 2770.306643][T14432] device veth1_vlan left promiscuous mode [ 2770.312428][T14432] device veth0_vlan left promiscuous mode [ 2770.435367][T14432] bond0 (unregistering): Released all slaves [ 2770.687598][T14043] chnl_net:caif_netlink_parms(): no params data found [ 2770.723590][T14043] bridge0: port 1(bridge_slave_0) entered blocking state [ 2770.730700][T14043] bridge0: port 1(bridge_slave_0) entered disabled state [ 2770.738319][T14043] device bridge_slave_0 entered promiscuous mode [ 2770.745697][T14043] bridge0: port 2(bridge_slave_1) entered blocking state [ 2770.752870][T14043] bridge0: port 2(bridge_slave_1) entered disabled state [ 2770.760548][T14043] device bridge_slave_1 entered promiscuous mode [ 2770.777939][T14043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2770.788023][T14043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2770.806592][T14043] team0: Port device team_slave_0 added [ 2770.813296][T14043] team0: Port device team_slave_1 added [ 2770.828215][T14043] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2770.835157][T14043] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2770.861343][T14043] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2770.872638][T14043] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2770.879606][T14043] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2770.905490][T14043] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2770.942970][T14043] device hsr_slave_0 entered promiscuous mode [ 2770.956733][T14043] device hsr_slave_1 entered promiscuous mode [ 2770.976157][T14043] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2770.983705][T14043] Cannot create hsr debugfs directory [ 2771.047507][T14043] bridge0: port 2(bridge_slave_1) entered blocking state [ 2771.054556][T14043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2771.061911][T14043] bridge0: port 1(bridge_slave_0) entered blocking state [ 2771.069035][T14043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2771.126412][T14043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2771.137653][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2771.146141][T17104] bridge0: port 1(bridge_slave_0) entered disabled state [ 2771.154246][T17104] bridge0: port 2(bridge_slave_1) entered disabled state [ 2771.166215][T14043] 8021q: adding VLAN 0 to HW filter on device team0 [ 2771.178652][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2771.187100][T17104] bridge0: port 1(bridge_slave_0) entered blocking state [ 2771.194115][T17104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2771.202901][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2771.211311][T17104] bridge0: port 2(bridge_slave_1) entered blocking state [ 2771.218488][T17104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2771.240118][T14043] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2771.250484][T14043] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2771.265280][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2771.274307][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2771.283006][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2771.291757][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2771.299977][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2771.307735][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2771.321847][T14043] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2771.333570][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2771.342358][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2771.395465][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2771.455328][T14043] device veth0_vlan entered promiscuous mode [ 2771.462404][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2771.472455][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2771.480707][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2771.491496][T14043] device veth1_vlan entered promiscuous mode [ 2771.498348][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2771.515263][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2771.524427][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2771.535069][T14043] device veth0_macvtap entered promiscuous mode [ 2771.544031][T14043] device veth1_macvtap entered promiscuous mode [ 2771.557786][T14043] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2771.565295][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2771.576447][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2771.586846][T14043] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2771.597705][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2771.662794][T14071] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2771.685178][T14071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2771.694993][T14071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2771.713226][T14071] device bridge_slave_0 left promiscuous mode [ 2771.720043][T14071] bridge0: port 1(bridge_slave_0) entered disabled state [ 2771.735510][T14071] device bridge_slave_1 left promiscuous mode [ 2771.742539][T14071] bridge0: port 2(bridge_slave_1) entered disabled state [ 2771.761189][T14071] bond0: (slave bond_slave_0): Releasing backup interface [ 2771.799854][T14071] bond0: (slave bond_slave_1): Releasing backup interface [ 2771.880805][T14071] team0: Port device team_slave_0 removed [ 2771.933154][T14071] team0: Port device team_slave_1 removed [ 2771.945007][T14071] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2771.953248][T14071] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2771.968508][T14071] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2771.976310][T14071] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xd8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xb4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x54, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xd8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xffffffc3, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:15 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4a020000, {r0}}, 0x58) 17:23:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000060000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:15 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4c000000, {r0}}, 0x58) 17:23:15 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4d020000, {r0}}, 0x58) 17:23:15 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4e020000, {r0}}, 0x58) [ 2772.205372][T14073] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x51000000, {r0}}, 0x58) 17:23:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x52000000, {r0}}, 0x58) [ 2772.278315][T14073] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2772.316707][T14073] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x52030000, {r0}}, 0x58) [ 2772.621891][T14078] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2772.683128][T14078] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2772.703191][T14078] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xd8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xb4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x54, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xd8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2772.824526][T14079] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xffffffea, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x54000000, {r0}}, 0x58) [ 2772.869332][T14092] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2772.891269][T14092] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2772.899746][T14092] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2773.021446][T14196] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2773.054356][T14196] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2773.063179][T14196] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2773.192714][T14198] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2773.204078][T14198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2773.211949][T14198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2773.539883][T14432] device hsr_slave_0 left promiscuous mode [ 2773.546440][T14432] device hsr_slave_1 left promiscuous mode [ 2773.555146][T14432] device veth1_macvtap left promiscuous mode [ 2773.561166][T14432] device veth0_macvtap left promiscuous mode [ 2773.567173][T14432] device veth1_vlan left promiscuous mode [ 2773.572894][T14432] device veth0_vlan left promiscuous mode [ 2773.691623][T14432] bond0 (unregistering): Released all slaves [ 2773.995962][T14200] chnl_net:caif_netlink_parms(): no params data found [ 2774.067749][T14200] bridge0: port 1(bridge_slave_0) entered blocking state [ 2774.074788][T14200] bridge0: port 1(bridge_slave_0) entered disabled state [ 2774.082642][T14200] device bridge_slave_0 entered promiscuous mode [ 2774.089848][T14200] bridge0: port 2(bridge_slave_1) entered blocking state [ 2774.096937][T14200] bridge0: port 2(bridge_slave_1) entered disabled state [ 2774.104677][T14200] device bridge_slave_1 entered promiscuous mode [ 2774.132390][T14200] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2774.157569][T14200] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2774.177216][T14200] team0: Port device team_slave_0 added [ 2774.197495][T14200] team0: Port device team_slave_1 added [ 2774.223605][T14200] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2774.230567][T14200] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2774.256568][T14200] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2774.267867][T14200] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2774.274803][T14200] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2774.300700][T14200] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2774.327928][T14200] device hsr_slave_0 entered promiscuous mode [ 2774.346505][T14200] device hsr_slave_1 entered promiscuous mode [ 2774.352833][T14200] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2774.363080][T14200] Cannot create hsr debugfs directory [ 2774.434200][T14200] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2774.445251][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2774.453551][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2774.462722][T14200] 8021q: adding VLAN 0 to HW filter on device team0 [ 2774.471850][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2774.480753][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2774.489428][ T1924] bridge0: port 1(bridge_slave_0) entered blocking state [ 2774.496490][ T1924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2774.515122][T14200] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2774.525498][T14200] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2774.538297][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2774.546459][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2774.555106][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2774.563453][ T7648] bridge0: port 2(bridge_slave_1) entered blocking state [ 2774.570539][ T7648] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2774.578556][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2774.587542][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2774.596325][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2774.604883][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2774.613509][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2774.622107][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2774.631014][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2774.640214][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2774.654722][T14200] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2774.665078][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2774.673211][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2774.682239][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2774.689863][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2774.736557][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2774.795168][T14200] device veth0_vlan entered promiscuous mode [ 2774.802055][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2774.812015][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2774.820015][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2774.831504][T14200] device veth1_vlan entered promiscuous mode [ 2774.845134][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2774.854374][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2774.863032][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2774.873631][T14200] device veth0_macvtap entered promiscuous mode [ 2774.882628][T14200] device veth1_macvtap entered promiscuous mode [ 2774.896991][T14200] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2774.904284][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2774.915402][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2774.925563][T14200] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2774.933411][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2774.998401][T14228] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2775.021658][T14228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2775.031443][T14228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2775.052590][T14228] device bridge_slave_0 left promiscuous mode [ 2775.059281][T14228] bridge0: port 1(bridge_slave_0) entered disabled state [ 2775.075994][T14228] device bridge_slave_1 left promiscuous mode [ 2775.082945][T14228] bridge0: port 2(bridge_slave_1) entered disabled state [ 2775.101831][T14228] bond0: (slave bond_slave_0): Releasing backup interface [ 2775.141523][T14228] bond0: (slave bond_slave_1): Releasing backup interface [ 2775.219492][T14228] team0: Port device team_slave_0 removed [ 2775.266746][T14228] team0: Port device team_slave_1 removed [ 2775.277712][T14228] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2775.285363][T14228] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2775.300126][T14228] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2775.307938][T14228] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xd8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xb4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x54, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xd8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000064000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5a000000, {r0}}, 0x58) 17:23:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xffffffef, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5a030000, {r0}}, 0x58) [ 2775.393649][T14230] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5c010000, {r0}}, 0x58) [ 2775.454711][T14234] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2775.486468][T14234] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:23:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x60000000, {r0}}, 0x58) [ 2775.508270][T14234] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x60010000, {r0}}, 0x58) 17:23:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x60020000, {r0}}, 0x58) [ 2775.663241][T14236] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2775.720776][T14236] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2775.741016][T14236] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2776.018877][T14246] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2776.046041][T14246] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2776.064774][T14246] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2776.118606][T14249] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2776.133388][T14249] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2776.147420][T14249] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2776.173550][T14230] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2776.768302][T14432] device hsr_slave_0 left promiscuous mode [ 2776.774437][T14432] device hsr_slave_1 left promiscuous mode [ 2776.785171][T14432] device veth1_macvtap left promiscuous mode [ 2776.791224][T14432] device veth0_macvtap left promiscuous mode [ 2776.797255][T14432] device veth1_vlan left promiscuous mode [ 2776.802972][T14432] device veth0_vlan left promiscuous mode [ 2776.924688][T14432] bond0 (unregistering): Released all slaves [ 2777.381660][T14251] chnl_net:caif_netlink_parms(): no params data found [ 2777.457498][T14251] bridge0: port 1(bridge_slave_0) entered blocking state [ 2777.464618][T14251] bridge0: port 1(bridge_slave_0) entered disabled state [ 2777.472767][T14251] device bridge_slave_0 entered promiscuous mode [ 2777.480712][T14251] bridge0: port 2(bridge_slave_1) entered blocking state [ 2777.487760][T14251] bridge0: port 2(bridge_slave_1) entered disabled state [ 2777.495504][T14251] device bridge_slave_1 entered promiscuous mode [ 2777.514043][T14251] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2777.524341][T14251] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2777.545200][T14251] team0: Port device team_slave_0 added [ 2777.553120][T14251] team0: Port device team_slave_1 added [ 2777.569838][T14251] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2777.576904][T14251] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2777.602878][T14251] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2777.615009][T14251] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2777.621980][T14251] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2777.647997][T14251] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2777.672460][T14251] device hsr_slave_0 entered promiscuous mode [ 2777.679041][T14251] device hsr_slave_1 entered promiscuous mode [ 2777.685428][T14251] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2777.694247][T14251] Cannot create hsr debugfs directory [ 2777.753865][T14251] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2777.766100][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2777.775954][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2777.785114][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2777.794532][T14251] 8021q: adding VLAN 0 to HW filter on device team0 [ 2777.805181][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2777.814255][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2777.823531][T17104] bridge0: port 1(bridge_slave_0) entered blocking state [ 2777.830635][T17104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2777.848496][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2777.857442][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2777.866042][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2777.874572][T28225] bridge0: port 2(bridge_slave_1) entered blocking state [ 2777.881612][T28225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2777.890865][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2777.899796][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2777.912732][T14251] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2777.923127][T14251] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2777.936161][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2777.944197][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2777.953034][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2777.967332][T14251] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2777.974770][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2777.982652][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2777.990107][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2778.042358][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2778.102752][T14251] device veth0_vlan entered promiscuous mode [ 2778.111221][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2778.120342][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2778.129042][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2778.139209][T14251] device veth1_vlan entered promiscuous mode [ 2778.147132][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2778.161564][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2778.170994][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2778.180671][T14251] device veth0_macvtap entered promiscuous mode [ 2778.190250][T14251] device veth1_macvtap entered promiscuous mode [ 2778.202903][T14251] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2778.211122][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2778.221055][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2778.232398][T14251] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2778.240397][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2778.310222][T14279] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2778.332226][T14279] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2778.341096][T14279] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2778.360485][T14279] device bridge_slave_0 left promiscuous mode [ 2778.367235][T14279] bridge0: port 1(bridge_slave_0) entered disabled state [ 2778.382214][T14279] device bridge_slave_1 left promiscuous mode [ 2778.389523][T14279] bridge0: port 2(bridge_slave_1) entered disabled state [ 2778.407884][T14279] bond0: (slave bond_slave_0): Releasing backup interface [ 2778.445070][T14279] bond0: (slave bond_slave_1): Releasing backup interface [ 2778.520298][T14279] team0: Port device team_slave_0 removed [ 2778.567734][T14279] team0: Port device team_slave_1 removed [ 2778.579072][T14279] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2778.586872][T14279] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2778.603941][T14279] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2778.611882][T14279] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:22 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x61030000, {r0}}, 0x58) 17:23:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xfffffff0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:22 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104005865000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:22 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x64000000, {r0}}, 0x58) [ 2778.746490][T14285] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2778.778076][T14285] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:23:22 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x68000000, {r0}}, 0x58) [ 2778.805447][T14285] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:22 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6a000000, {r0}}, 0x58) [ 2778.863420][T14283] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:22 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6a010000, {r0}}, 0x58) 17:23:22 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6a030000, {r0}}, 0x58) [ 2778.971822][T14287] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2779.057166][T14287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2779.082970][T14287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2779.343457][T14295] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2779.366663][T14295] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2779.384050][T14295] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2779.469020][T14300] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2779.486845][T14300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2779.500621][T14300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6c000000, {r0}}, 0x58) 17:23:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0xfffffffe, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2779.531876][T14283] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2779.595111][T14305] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2779.624113][T14305] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2779.633781][T14305] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2779.704570][T14307] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2779.732965][T14307] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2779.741425][T14307] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2779.853017][T14308] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2779.865926][T14308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2779.873923][T14308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2780.247883][T30727] device hsr_slave_0 left promiscuous mode [ 2780.254128][T30727] device hsr_slave_1 left promiscuous mode [ 2780.264362][T30727] device veth1_macvtap left promiscuous mode [ 2780.270470][T30727] device veth0_macvtap left promiscuous mode [ 2780.276749][T30727] device veth1_vlan left promiscuous mode [ 2780.282471][T30727] device veth0_vlan left promiscuous mode [ 2780.400499][T30727] bond0 (unregistering): Released all slaves [ 2780.693917][T14310] chnl_net:caif_netlink_parms(): no params data found [ 2780.729427][T14310] bridge0: port 1(bridge_slave_0) entered blocking state [ 2780.736579][T14310] bridge0: port 1(bridge_slave_0) entered disabled state [ 2780.744354][T14310] device bridge_slave_0 entered promiscuous mode [ 2780.752329][T14310] bridge0: port 2(bridge_slave_1) entered blocking state [ 2780.759476][T14310] bridge0: port 2(bridge_slave_1) entered disabled state [ 2780.767975][T14310] device bridge_slave_1 entered promiscuous mode [ 2780.785236][T14310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2780.796830][T14310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2780.815739][T14310] team0: Port device team_slave_0 added [ 2780.837142][T14310] team0: Port device team_slave_1 added [ 2780.864045][T14310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2780.871064][T14310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2780.897119][T14310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2780.908521][T14310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2780.915457][T14310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2780.941653][T14310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2780.983529][T14310] device hsr_slave_0 entered promiscuous mode [ 2780.990215][T14310] device hsr_slave_1 entered promiscuous mode [ 2781.002807][T14310] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2781.011295][T14310] Cannot create hsr debugfs directory [ 2781.084097][T14310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2781.095038][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2781.102996][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2781.111977][T14310] 8021q: adding VLAN 0 to HW filter on device team0 [ 2781.120978][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2781.129764][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2781.138491][T17104] bridge0: port 1(bridge_slave_0) entered blocking state [ 2781.145515][T17104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2781.164044][T14310] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2781.174762][T14310] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2781.187604][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2781.195463][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2781.204448][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2781.212845][ T4533] bridge0: port 2(bridge_slave_1) entered blocking state [ 2781.219879][ T4533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2781.228057][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2781.237074][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2781.245748][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2781.254497][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2781.263174][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2781.272074][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2781.280596][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2781.289432][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2781.303929][T14310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2781.313863][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2781.321649][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2781.330136][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2781.337611][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2781.388704][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2781.449590][T14310] device veth0_vlan entered promiscuous mode [ 2781.456591][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2781.465074][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2781.474263][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2781.484619][T14310] device veth1_vlan entered promiscuous mode [ 2781.491626][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2781.506810][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2781.515213][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2781.524949][T14310] device veth0_macvtap entered promiscuous mode [ 2781.534110][T14310] device veth1_macvtap entered promiscuous mode [ 2781.545803][T14310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2781.553740][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2781.562174][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2781.570832][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2781.581604][T14310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2781.589546][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2781.655925][T14338] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2781.680238][T14338] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2781.689275][T14338] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2781.711616][T14338] device bridge_slave_0 left promiscuous mode [ 2781.718401][T14338] bridge0: port 1(bridge_slave_0) entered disabled state [ 2781.734092][T14338] device bridge_slave_1 left promiscuous mode [ 2781.741044][T14338] bridge0: port 2(bridge_slave_1) entered disabled state [ 2781.760406][T14338] bond0: (slave bond_slave_0): Releasing backup interface [ 2781.798323][T14338] bond0: (slave bond_slave_1): Releasing backup interface [ 2781.878737][T14338] team0: Port device team_slave_0 removed [ 2781.929950][T14338] team0: Port device team_slave_1 removed [ 2781.940687][T14338] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2781.948493][T14338] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2781.964377][T14338] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2781.972228][T14338] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:25 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6c030000, {r0}}, 0x58) 17:23:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:25 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000068000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2782.062316][T14342] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:25 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6f030000, {r0}}, 0x58) [ 2782.112762][T14345] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2782.137814][T14345] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:23:25 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x72000000, {r0}}, 0x58) [ 2782.156229][T14345] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:25 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x72010000, {r0}}, 0x58) 17:23:25 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x74000000, {r0}}, 0x58) 17:23:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:26 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x76020000, {r0}}, 0x58) [ 2782.310732][T14346] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2782.387434][T14346] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2782.413493][T14346] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2782.675631][T14356] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2782.699774][T14356] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2782.717551][T14356] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2782.799302][T14360] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2782.822485][T14360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2782.830639][T14360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:26 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x76030000, {r0}}, 0x58) 17:23:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2782.864719][T14342] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2783.279159][T14424] device hsr_slave_0 left promiscuous mode [ 2783.285236][T14424] device hsr_slave_1 left promiscuous mode [ 2783.294394][T14424] device veth1_macvtap left promiscuous mode [ 2783.300515][T14424] device veth0_macvtap left promiscuous mode [ 2783.306608][T14424] device veth1_vlan left promiscuous mode [ 2783.312459][T14424] device veth0_vlan left promiscuous mode [ 2783.435780][T14424] bond0 (unregistering): Released all slaves [ 2784.081170][T14364] chnl_net:caif_netlink_parms(): no params data found [ 2784.118704][T14364] bridge0: port 1(bridge_slave_0) entered blocking state [ 2784.125741][T14364] bridge0: port 1(bridge_slave_0) entered disabled state [ 2784.134388][T14364] device bridge_slave_0 entered promiscuous mode [ 2784.141674][T14364] bridge0: port 2(bridge_slave_1) entered blocking state [ 2784.148739][T14364] bridge0: port 2(bridge_slave_1) entered disabled state [ 2784.157913][T14364] device bridge_slave_1 entered promiscuous mode [ 2784.174988][T14364] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2784.186216][T14364] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2784.204815][T14364] team0: Port device team_slave_0 added [ 2784.212458][T14364] team0: Port device team_slave_1 added [ 2784.228613][T14364] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2784.235563][T14364] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2784.261545][T14364] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2784.272783][T14364] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2784.279739][T14364] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2784.305712][T14364] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2784.327779][T14364] device hsr_slave_0 entered promiscuous mode [ 2784.334248][T14364] device hsr_slave_1 entered promiscuous mode [ 2784.340677][T14364] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2784.348515][T14364] Cannot create hsr debugfs directory [ 2784.385311][T14364] bridge0: port 2(bridge_slave_1) entered blocking state [ 2784.392413][T14364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2784.399692][T14364] bridge0: port 1(bridge_slave_0) entered blocking state [ 2784.406749][T14364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2784.440299][T14364] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2784.451840][T17104] bridge0: port 1(bridge_slave_0) entered disabled state [ 2784.459903][T17104] bridge0: port 2(bridge_slave_1) entered disabled state [ 2784.470027][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2784.480017][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2784.488932][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2784.498020][T14364] 8021q: adding VLAN 0 to HW filter on device team0 [ 2784.509552][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2784.518172][T17104] bridge0: port 1(bridge_slave_0) entered blocking state [ 2784.525277][T17104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2784.541143][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2784.549651][T17104] bridge0: port 2(bridge_slave_1) entered blocking state [ 2784.556693][T17104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2784.565592][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2784.579842][T14364] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2784.590282][T14364] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2784.603401][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2784.611933][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2784.620644][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2784.629222][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2784.643434][T14364] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2784.652509][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2784.660396][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2784.668192][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2784.722073][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2784.786430][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2784.795038][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2784.804006][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2784.811814][T14364] device veth0_vlan entered promiscuous mode [ 2784.822646][T14364] device veth1_vlan entered promiscuous mode [ 2784.835989][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2784.844307][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2784.853008][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2784.862822][T14364] device veth0_macvtap entered promiscuous mode [ 2784.871433][T14364] device veth1_macvtap entered promiscuous mode [ 2784.884164][T14364] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2784.891707][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2784.901745][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2784.912122][T14364] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2784.919965][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2784.987263][T14392] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2785.010804][T14392] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2785.019384][T14392] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2785.037745][T14392] device bridge_slave_0 left promiscuous mode [ 2785.044652][T14392] bridge0: port 1(bridge_slave_0) entered disabled state [ 2785.059424][T14392] device bridge_slave_1 left promiscuous mode [ 2785.066031][T14392] bridge0: port 2(bridge_slave_1) entered disabled state [ 2785.083860][T14392] bond0: (slave bond_slave_0): Releasing backup interface [ 2785.119158][T14392] bond0: (slave bond_slave_1): Releasing backup interface [ 2785.195621][T14392] team0: Port device team_slave_0 removed [ 2785.244468][T14392] team0: Port device team_slave_1 removed [ 2785.255247][T14392] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2785.263118][T14392] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2785.277144][T14392] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2785.284915][T14392] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x2}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:29 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x77000000, {r0}}, 0x58) 17:23:29 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400006c000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:29 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x78030000, {r0}}, 0x58) [ 2785.371112][T14398] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2785.419057][T14397] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2785.456012][T14397] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:23:29 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7a000000, {r0}}, 0x58) [ 2785.480744][T14397] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:29 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7a010000, {r0}}, 0x58) 17:23:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:29 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7a030000, {r0}}, 0x58) 17:23:29 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7c000000, {r0}}, 0x58) [ 2785.651424][T14400] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:29 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7c010000, {r0}}, 0x58) [ 2785.749909][T14400] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2785.776733][T14400] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2786.061804][T14411] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2786.096556][T14411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2786.109599][T14411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2786.142815][T14416] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2786.154064][T14416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2786.161913][T14416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x3}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2786.191038][T14398] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2786.291398][T14419] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2786.320545][T14419] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2786.328953][T14419] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2786.910836][T30727] device hsr_slave_0 left promiscuous mode [ 2786.918243][T30727] device hsr_slave_1 left promiscuous mode [ 2786.927856][T30727] device veth1_macvtap left promiscuous mode [ 2786.933898][T30727] device veth0_macvtap left promiscuous mode [ 2786.940120][T30727] device veth1_vlan left promiscuous mode [ 2786.945850][T30727] device veth0_vlan left promiscuous mode [ 2787.068684][T30727] bond0 (unregistering): Released all slaves [ 2787.352792][T14423] chnl_net:caif_netlink_parms(): no params data found [ 2787.390342][T14423] bridge0: port 1(bridge_slave_0) entered blocking state [ 2787.397411][T14423] bridge0: port 1(bridge_slave_0) entered disabled state [ 2787.405008][T14423] device bridge_slave_0 entered promiscuous mode [ 2787.413632][T14423] bridge0: port 2(bridge_slave_1) entered blocking state [ 2787.420830][T14423] bridge0: port 2(bridge_slave_1) entered disabled state [ 2787.429432][T14423] device bridge_slave_1 entered promiscuous mode [ 2787.447250][T14423] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2787.458325][T14423] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2787.478649][T14423] team0: Port device team_slave_0 added [ 2787.484996][T14423] team0: Port device team_slave_1 added [ 2787.506974][T14423] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2787.513926][T14423] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2787.539833][T14423] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2787.552212][T14423] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2787.559264][T14423] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2787.585392][T14423] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2787.608530][T14423] device hsr_slave_0 entered promiscuous mode [ 2787.626379][T14423] device hsr_slave_1 entered promiscuous mode [ 2787.646517][T14423] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2787.654079][T14423] Cannot create hsr debugfs directory [ 2787.767966][T14423] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2787.777924][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2787.788587][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2787.796330][T17104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2787.805464][T14423] 8021q: adding VLAN 0 to HW filter on device team0 [ 2787.815989][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2787.824671][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2787.834118][ T4533] bridge0: port 1(bridge_slave_0) entered blocking state [ 2787.841188][ T4533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2787.857536][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2787.865421][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2787.874932][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2787.884024][T28225] bridge0: port 2(bridge_slave_1) entered blocking state [ 2787.891114][T28225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2787.899054][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2787.907978][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2787.916891][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2787.925727][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2787.934763][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2787.946012][T14423] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2787.956486][T14423] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2787.972343][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2787.981250][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2787.996889][T14423] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2788.004319][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2788.013262][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2788.020744][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2788.070169][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2788.129947][T14423] device veth0_vlan entered promiscuous mode [ 2788.136765][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2788.145174][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2788.154262][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2788.164162][T14423] device veth1_vlan entered promiscuous mode [ 2788.172012][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2788.187886][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2788.196557][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2788.205948][T14423] device veth0_macvtap entered promiscuous mode [ 2788.215563][T14423] device veth1_macvtap entered promiscuous mode [ 2788.229889][T14423] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2788.237679][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2788.248410][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2788.259214][T14423] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2788.266772][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:23:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x84010000, {r0}}, 0x58) 17:23:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000074000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x4}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x84020000, {r0}}, 0x58) [ 2788.391737][T14456] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x84030000, {r0}}, 0x58) [ 2788.444816][T14456] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2788.462167][T14456] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x85a00000, {r0}}, 0x58) 17:23:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x85edad00, {r0}}, 0x58) [ 2788.639256][T14460] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x86010000, {r0}}, 0x58) 17:23:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x86020000, {r0}}, 0x58) [ 2788.792206][T14461] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2788.878094][T14461] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2788.908622][T14461] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x88030000, {r0}}, 0x58) 17:23:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2789.195134][T14468] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2789.207113][T14468] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2789.214526][T14468] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2789.330997][T14577] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2789.358594][T14577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2789.366979][T14577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2789.818843][T14424] device hsr_slave_0 left promiscuous mode [ 2789.825112][T14424] device hsr_slave_1 left promiscuous mode [ 2789.831620][T14424] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2789.839150][T14424] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2789.847692][T14424] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2789.855073][T14424] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2789.862885][T14424] device bridge_slave_1 left promiscuous mode [ 2789.869084][T14424] bridge0: port 2(bridge_slave_1) entered disabled state [ 2789.877562][T14424] device bridge_slave_0 left promiscuous mode [ 2789.883838][T14424] bridge0: port 1(bridge_slave_0) entered disabled state [ 2789.894974][T14424] device veth1_macvtap left promiscuous mode [ 2789.901968][T14424] device veth0_macvtap left promiscuous mode [ 2789.907966][T14424] device veth1_vlan left promiscuous mode [ 2789.913719][T14424] device veth0_vlan left promiscuous mode [ 2790.004248][T14424] team0 (unregistering): Port device team_slave_1 removed [ 2790.015047][T14424] team0 (unregistering): Port device team_slave_0 removed [ 2790.026563][T14424] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2790.041446][T14424] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2790.072464][T14424] bond0 (unregistering): Released all slaves [ 2790.330431][T14582] chnl_net:caif_netlink_parms(): no params data found [ 2790.369113][T14582] bridge0: port 1(bridge_slave_0) entered blocking state [ 2790.376201][T14582] bridge0: port 1(bridge_slave_0) entered disabled state [ 2790.384868][T14582] device bridge_slave_0 entered promiscuous mode [ 2790.392482][T14582] bridge0: port 2(bridge_slave_1) entered blocking state [ 2790.399565][T14582] bridge0: port 2(bridge_slave_1) entered disabled state [ 2790.408354][T14582] device bridge_slave_1 entered promiscuous mode [ 2790.425693][T14582] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2790.440118][T14582] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2790.460402][T14582] team0: Port device team_slave_0 added [ 2790.477696][T14582] team0: Port device team_slave_1 added [ 2790.517119][T14582] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2790.524118][T14582] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2790.550060][T14582] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2790.561912][T14582] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2790.568867][T14582] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2790.594998][T14582] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2790.629712][T14582] device hsr_slave_0 entered promiscuous mode [ 2790.647287][T14582] device hsr_slave_1 entered promiscuous mode [ 2790.656306][T14582] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2790.663840][T14582] Cannot create hsr debugfs directory [ 2790.738802][T14582] bridge0: port 2(bridge_slave_1) entered blocking state [ 2790.745946][T14582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2790.753279][T14582] bridge0: port 1(bridge_slave_0) entered blocking state [ 2790.760315][T14582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2790.789014][T14582] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2790.801204][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2790.809707][T28225] bridge0: port 1(bridge_slave_0) entered disabled state [ 2790.818473][T28225] bridge0: port 2(bridge_slave_1) entered disabled state [ 2790.830609][T14582] 8021q: adding VLAN 0 to HW filter on device team0 [ 2790.841469][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2790.850076][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2790.857152][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2790.880509][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2790.889009][T28225] bridge0: port 2(bridge_slave_1) entered blocking state [ 2790.896101][T28225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2790.905974][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2790.915269][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2790.924992][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2790.933227][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2790.943473][T14582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2790.952351][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2790.966612][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2790.974200][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2790.984180][T14582] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2791.039714][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2791.099586][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2791.109378][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2791.116992][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2791.125579][T14582] device veth0_vlan entered promiscuous mode [ 2791.135985][T14582] device veth1_vlan entered promiscuous mode [ 2791.149978][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2791.158156][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2791.167678][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2791.177187][T14582] device veth0_macvtap entered promiscuous mode [ 2791.184886][T14582] device veth1_macvtap entered promiscuous mode [ 2791.199482][T14582] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2791.207669][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2791.217815][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2791.228091][T14582] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2791.238370][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2791.307233][T14610] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2791.331933][T14610] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2791.340860][T14610] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2791.359459][T14610] device bridge_slave_0 left promiscuous mode [ 2791.366329][T14610] bridge0: port 1(bridge_slave_0) entered disabled state [ 2791.381414][T14610] device bridge_slave_1 left promiscuous mode [ 2791.388764][T14610] bridge0: port 2(bridge_slave_1) entered disabled state [ 2791.408014][T14610] bond0: (slave bond_slave_0): Releasing backup interface [ 2791.446514][T14610] bond0: (slave bond_slave_1): Releasing backup interface [ 2791.527522][T14610] team0: Port device team_slave_0 removed [ 2791.577751][T14610] team0: Port device team_slave_1 removed [ 2791.589530][T14610] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2791.597394][T14610] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2791.612997][T14610] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2791.621067][T14610] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400007a000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8e000000, {r0}}, 0x58) 17:23:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x5}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8e030000, {r0}}, 0x58) [ 2791.709175][T14615] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x90030000, {r0}}, 0x58) 17:23:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x92020000, {r0}}, 0x58) [ 2791.798691][T14618] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x92030000, {r0}}, 0x58) [ 2791.867862][T14618] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2791.889101][T14618] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x95020000, {r0}}, 0x58) 17:23:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x96020000, {r0}}, 0x58) [ 2792.194368][T14617] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2792.246794][T14617] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2792.264904][T14617] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2792.524572][T14615] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:36 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000081000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:36 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x98010000, {r0}}, 0x58) 17:23:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2792.651113][T14637] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2792.680475][T14637] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2792.690148][T14637] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2792.793955][T14639] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2793.248975][T14432] device hsr_slave_0 left promiscuous mode [ 2793.255003][T14432] device hsr_slave_1 left promiscuous mode [ 2793.263640][T14432] device veth1_macvtap left promiscuous mode [ 2793.269693][T14432] device veth0_macvtap left promiscuous mode [ 2793.275668][T14432] device veth1_vlan left promiscuous mode [ 2793.281509][T14432] device veth0_vlan left promiscuous mode [ 2793.399659][T14432] bond0 (unregistering): Released all slaves [ 2793.733901][T14741] chnl_net:caif_netlink_parms(): no params data found [ 2793.817171][T14741] bridge0: port 1(bridge_slave_0) entered blocking state [ 2793.824366][T14741] bridge0: port 1(bridge_slave_0) entered disabled state [ 2793.846760][T14741] device bridge_slave_0 entered promiscuous mode [ 2793.856923][T14741] bridge0: port 2(bridge_slave_1) entered blocking state [ 2793.863951][T14741] bridge0: port 2(bridge_slave_1) entered disabled state [ 2793.871983][T14741] device bridge_slave_1 entered promiscuous mode [ 2793.899171][T14741] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2793.917578][T14741] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2793.942353][T14741] team0: Port device team_slave_0 added [ 2793.956876][T14741] team0: Port device team_slave_1 added [ 2793.977516][T14741] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2793.984460][T14741] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2794.010486][T14741] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2794.021846][T14741] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2794.028814][T14741] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2794.054763][T14741] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2794.077476][T14741] device hsr_slave_0 entered promiscuous mode [ 2794.084171][T14741] device hsr_slave_1 entered promiscuous mode [ 2794.090651][T14741] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2794.098414][T14741] Cannot create hsr debugfs directory [ 2794.159199][T14741] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2794.170337][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2794.180041][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2794.188089][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2794.197162][T14741] 8021q: adding VLAN 0 to HW filter on device team0 [ 2794.207929][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2794.216852][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2794.225512][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2794.233167][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2794.241245][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2794.249853][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2794.258364][T16602] bridge0: port 2(bridge_slave_1) entered blocking state [ 2794.265539][T16602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2794.284040][T14741] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2794.294426][T14741] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2794.308726][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2794.318432][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2794.327607][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2794.336338][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2794.344796][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2794.361993][T14741] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2794.371229][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2794.379083][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2794.394345][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2794.402077][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2794.448149][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2794.508597][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2794.517332][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2794.524910][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2794.535240][T14741] device veth0_vlan entered promiscuous mode [ 2794.544634][T14741] device veth1_vlan entered promiscuous mode [ 2794.558663][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2794.566764][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2794.574998][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2794.586479][T14741] device veth0_macvtap entered promiscuous mode [ 2794.594321][T14741] device veth1_macvtap entered promiscuous mode [ 2794.607987][T14741] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2794.615221][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2794.624793][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2794.635154][T14741] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2794.643489][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2794.714228][T14769] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2794.742214][T14769] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2794.751129][T14769] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2794.772284][T14769] device bridge_slave_0 left promiscuous mode [ 2794.779494][T14769] bridge0: port 1(bridge_slave_0) entered disabled state [ 2794.795580][T14769] device bridge_slave_1 left promiscuous mode [ 2794.802665][T14769] bridge0: port 2(bridge_slave_1) entered disabled state [ 2794.823125][T14769] bond0: (slave bond_slave_0): Releasing backup interface [ 2794.864287][T14769] bond0: (slave bond_slave_1): Releasing backup interface [ 2794.948552][T14769] team0: Port device team_slave_0 removed [ 2794.999582][T14769] team0: Port device team_slave_1 removed [ 2795.011971][T14769] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2795.019987][T14769] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2795.035450][T14769] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2795.043216][T14769] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9a020000, {r0}}, 0x58) 17:23:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104004788000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x6}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2795.126518][T14774] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9c030000, {r0}}, 0x58) 17:23:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9e030000, {r0}}, 0x58) 17:23:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9f050000, {r0}}, 0x58) [ 2795.259063][T14772] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa0020000, {r0}}, 0x58) 17:23:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa2000000, {r0}}, 0x58) [ 2795.337684][T14772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2795.351769][T14772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa2030000, {r0}}, 0x58) [ 2795.652519][T14776] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2795.710718][T14776] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2795.728748][T14776] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2795.949796][T14774] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2796.508153][T14432] device hsr_slave_0 left promiscuous mode [ 2796.514301][T14432] device hsr_slave_1 left promiscuous mode [ 2796.524207][T14432] device veth1_macvtap left promiscuous mode [ 2796.530223][T14432] device veth0_macvtap left promiscuous mode [ 2796.536289][T14432] device veth1_vlan left promiscuous mode [ 2796.542076][T14432] device veth0_vlan left promiscuous mode [ 2796.660784][T14432] bond0 (unregistering): Released all slaves [ 2797.150195][T14792] chnl_net:caif_netlink_parms(): no params data found [ 2797.231606][T14792] bridge0: port 1(bridge_slave_0) entered blocking state [ 2797.238703][T14792] bridge0: port 1(bridge_slave_0) entered disabled state [ 2797.247590][T14792] device bridge_slave_0 entered promiscuous mode [ 2797.256683][T14792] bridge0: port 2(bridge_slave_1) entered blocking state [ 2797.263721][T14792] bridge0: port 2(bridge_slave_1) entered disabled state [ 2797.288199][T14792] device bridge_slave_1 entered promiscuous mode [ 2797.316946][T14792] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2797.329244][T14792] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2797.348252][T14792] team0: Port device team_slave_0 added [ 2797.354755][T14792] team0: Port device team_slave_1 added [ 2797.370840][T14792] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2797.377888][T14792] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2797.403855][T14792] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2797.416502][T14792] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2797.423460][T14792] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2797.449838][T14792] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2797.474057][T14792] device hsr_slave_0 entered promiscuous mode [ 2797.481811][T14792] device hsr_slave_1 entered promiscuous mode [ 2797.488453][T14792] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2797.496078][T14792] Cannot create hsr debugfs directory [ 2797.533238][T14792] bridge0: port 2(bridge_slave_1) entered blocking state [ 2797.540313][T14792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2797.547633][T14792] bridge0: port 1(bridge_slave_0) entered blocking state [ 2797.554646][T14792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2797.586528][T14792] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2797.597109][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2797.605380][T16602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2797.613575][T16602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2797.622857][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2797.634086][T14792] 8021q: adding VLAN 0 to HW filter on device team0 [ 2797.643571][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2797.652248][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2797.659326][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2797.677527][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2797.685781][T16602] bridge0: port 2(bridge_slave_1) entered blocking state [ 2797.692837][T16602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2797.701968][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2797.710829][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2797.722747][T14792] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2797.733250][T14792] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2797.746295][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2797.754488][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2797.763351][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2797.772070][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2797.786075][T14792] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2797.795454][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2797.803241][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2797.860793][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2797.920958][T14792] device veth0_vlan entered promiscuous mode [ 2797.928845][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2797.938064][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2797.945987][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2797.957468][T14792] device veth1_vlan entered promiscuous mode [ 2797.967294][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2797.975384][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2797.989450][T14792] device veth0_macvtap entered promiscuous mode [ 2797.997853][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2798.007676][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2798.017083][T14792] device veth1_macvtap entered promiscuous mode [ 2798.030030][T14792] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2798.037823][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2798.049453][T14792] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2798.057107][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2798.124509][T14820] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2798.146742][T14820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2798.155447][T14820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2798.173139][T14820] device bridge_slave_0 left promiscuous mode [ 2798.180144][T14820] bridge0: port 1(bridge_slave_0) entered disabled state [ 2798.194991][T14820] device bridge_slave_1 left promiscuous mode [ 2798.202148][T14820] bridge0: port 2(bridge_slave_1) entered disabled state [ 2798.220729][T14820] bond0: (slave bond_slave_0): Releasing backup interface [ 2798.256917][T14820] bond0: (slave bond_slave_1): Releasing backup interface [ 2798.336020][T14820] team0: Port device team_slave_0 removed [ 2798.393167][T14820] team0: Port device team_slave_1 removed [ 2798.403852][T14820] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2798.411960][T14820] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2798.425885][T14820] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2798.433706][T14820] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa4030000, {r0}}, 0x58) 17:23:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x7}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104004888000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa7ffffff, {r0}}, 0x58) [ 2798.616761][T14828] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xaa020000, {r0}}, 0x58) [ 2798.676543][T14828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2798.697699][T14828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xaf010000, {r0}}, 0x58) 17:23:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb0000000, {r0}}, 0x58) 17:23:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb0010000, {r0}}, 0x58) 17:23:42 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb1020000, {r0}}, 0x58) [ 2798.961972][T14823] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2799.065777][T14823] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2799.096692][T14823] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2799.256508][T14825] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb4000000, {r0}}, 0x58) 17:23:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2799.349099][T14837] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2799.360116][T14837] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2799.368267][T14837] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2799.423750][T14944] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2799.452183][T14944] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2799.469127][T14944] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2799.640684][T14947] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2799.671502][T14947] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2799.680637][T14947] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2799.838491][T14948] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2799.850841][T14948] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2799.858467][T14948] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2800.331074][T14424] device hsr_slave_0 left promiscuous mode [ 2800.347508][T14424] device hsr_slave_1 left promiscuous mode [ 2800.370365][T14424] device veth1_macvtap left promiscuous mode [ 2800.376398][T14424] device veth0_macvtap left promiscuous mode [ 2800.382432][T14424] device veth1_vlan left promiscuous mode [ 2800.388250][T14424] device veth0_vlan left promiscuous mode [ 2800.523745][T14424] bond0 (unregistering): Released all slaves [ 2800.657950][T14951] chnl_net:caif_netlink_parms(): no params data found [ 2800.695091][T14951] bridge0: port 1(bridge_slave_0) entered blocking state [ 2800.702179][T14951] bridge0: port 1(bridge_slave_0) entered disabled state [ 2800.710956][T14951] device bridge_slave_0 entered promiscuous mode [ 2800.718227][T14951] bridge0: port 2(bridge_slave_1) entered blocking state [ 2800.727798][T14951] bridge0: port 2(bridge_slave_1) entered disabled state [ 2800.736450][T14951] device bridge_slave_1 entered promiscuous mode [ 2800.754455][T14951] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2800.764920][T14951] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2800.783898][T14951] team0: Port device team_slave_0 added [ 2800.790390][T14951] team0: Port device team_slave_1 added [ 2800.817048][T14951] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2800.824021][T14951] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2800.850071][T14951] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2800.861420][T14951] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2800.868379][T14951] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2800.894275][T14951] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2800.928388][T14951] device hsr_slave_0 entered promiscuous mode [ 2800.946360][T14951] device hsr_slave_1 entered promiscuous mode [ 2800.952806][T14951] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2800.961051][T14951] Cannot create hsr debugfs directory [ 2801.025958][T14951] bridge0: port 2(bridge_slave_1) entered blocking state [ 2801.033081][T14951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2801.040419][T14951] bridge0: port 1(bridge_slave_0) entered blocking state [ 2801.047460][T14951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2801.076599][T14951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2801.088141][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2801.096511][T24949] bridge0: port 1(bridge_slave_0) entered disabled state [ 2801.104529][T24949] bridge0: port 2(bridge_slave_1) entered disabled state [ 2801.116595][T14951] 8021q: adding VLAN 0 to HW filter on device team0 [ 2801.128165][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2801.136661][T24949] bridge0: port 1(bridge_slave_0) entered blocking state [ 2801.143683][T24949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2801.151996][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2801.160456][T24949] bridge0: port 2(bridge_slave_1) entered blocking state [ 2801.167490][T24949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2801.185865][T14951] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2801.196231][T14951] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2801.211296][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2801.220138][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2801.229104][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2801.237524][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2801.251403][T14951] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2801.260117][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2801.267817][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2801.275231][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2801.283356][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2801.336469][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2801.399241][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2801.408767][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2801.416599][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2801.425179][T14951] device veth0_vlan entered promiscuous mode [ 2801.435630][T14951] device veth1_vlan entered promiscuous mode [ 2801.449218][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2801.458588][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2801.466821][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2801.476063][T14951] device veth0_macvtap entered promiscuous mode [ 2801.487088][T14951] device veth1_macvtap entered promiscuous mode [ 2801.499490][T14951] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2801.507174][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2801.516902][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2801.527333][T14951] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2801.537675][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2801.604719][T14979] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2801.630328][T14979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2801.640029][T14979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2801.660779][T14979] device bridge_slave_0 left promiscuous mode [ 2801.667850][T14979] bridge0: port 1(bridge_slave_0) entered disabled state [ 2801.683773][T14979] device bridge_slave_1 left promiscuous mode [ 2801.690591][T14979] bridge0: port 2(bridge_slave_1) entered disabled state [ 2801.709095][T14979] bond0: (slave bond_slave_0): Releasing backup interface [ 2801.747398][T14979] bond0: (slave bond_slave_1): Releasing backup interface [ 2801.825810][T14979] team0: Port device team_slave_0 removed [ 2801.875887][T14979] team0: Port device team_slave_1 removed [ 2801.887743][T14979] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2801.895443][T14979] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2801.912299][T14979] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2801.920226][T14979] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb4010000, {r0}}, 0x58) 17:23:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x9}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400009e000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb6010000, {r0}}, 0x58) 17:23:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xbc000000, {r0}}, 0x58) 17:23:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xbc030000, {r0}}, 0x58) [ 2802.120271][T14985] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:45 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xbd000000, {r0}}, 0x58) [ 2802.224032][T14985] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:23:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc0010000, {r0}}, 0x58) 17:23:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff, {r0}}, 0x58) [ 2802.276811][T14985] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2802.486095][T14984] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2802.512636][T14984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2802.533629][T14984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2802.593972][T14981] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2802.665555][T14989] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2802.725977][T14989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2802.748054][T14989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2802.827902][T15002] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2802.851925][T15002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2802.864643][T15002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2803.994594][T15104] chnl_net:caif_netlink_parms(): no params data found [ 2804.029827][T15104] bridge0: port 1(bridge_slave_0) entered blocking state [ 2804.036888][T15104] bridge0: port 1(bridge_slave_0) entered disabled state [ 2804.044540][T15104] device bridge_slave_0 entered promiscuous mode [ 2804.052337][T15104] bridge0: port 2(bridge_slave_1) entered blocking state [ 2804.059395][T15104] bridge0: port 2(bridge_slave_1) entered disabled state [ 2804.067416][T15104] device bridge_slave_1 entered promiscuous mode [ 2804.085301][T15104] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2804.095711][T15104] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2804.114843][T15104] team0: Port device team_slave_0 added [ 2804.122412][T15104] team0: Port device team_slave_1 added [ 2804.138332][T15104] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2804.145270][T15104] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2804.171224][T15104] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2804.184024][T15104] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2804.191003][T15104] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2804.217015][T15104] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2804.240869][T15104] device hsr_slave_0 entered promiscuous mode [ 2804.248830][T15104] device hsr_slave_1 entered promiscuous mode [ 2804.255281][T15104] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2804.263054][T15104] Cannot create hsr debugfs directory [ 2804.300808][T15104] bridge0: port 2(bridge_slave_1) entered blocking state [ 2804.307869][T15104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2804.315115][T15104] bridge0: port 1(bridge_slave_0) entered blocking state [ 2804.322188][T15104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2804.353169][T15104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2804.363862][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2804.372189][ T4533] bridge0: port 1(bridge_slave_0) entered disabled state [ 2804.380461][ T4533] bridge0: port 2(bridge_slave_1) entered disabled state [ 2804.389503][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2804.400984][T15104] 8021q: adding VLAN 0 to HW filter on device team0 [ 2804.411360][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2804.419824][T28225] bridge0: port 1(bridge_slave_0) entered blocking state [ 2804.426866][T28225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2804.448061][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2804.456447][T16602] bridge0: port 2(bridge_slave_1) entered blocking state [ 2804.463472][T16602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2804.472758][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2804.481743][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2804.490721][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2804.498982][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2804.507675][T15104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2804.517059][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2804.529672][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2804.537212][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2804.547115][T15104] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2804.602766][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2804.659396][T15104] device veth0_vlan entered promiscuous mode [ 2804.668195][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2804.677278][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2804.684956][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2804.696318][T15104] device veth1_vlan entered promiscuous mode [ 2804.708023][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2804.716406][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2804.728372][T15104] device veth0_macvtap entered promiscuous mode [ 2804.736868][T15104] device veth1_macvtap entered promiscuous mode [ 2804.745345][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2804.759019][T15104] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2804.766376][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2804.776160][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2804.786436][T15104] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2804.796472][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2804.862699][T15132] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2804.884226][T15132] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2804.893490][T15132] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2804.911014][T15132] device bridge_slave_0 left promiscuous mode [ 2804.918073][T15132] bridge0: port 1(bridge_slave_0) entered disabled state [ 2804.932743][T15132] device bridge_slave_1 left promiscuous mode [ 2804.939622][T15132] bridge0: port 2(bridge_slave_1) entered disabled state [ 2804.958117][T15132] bond0: (slave bond_slave_0): Releasing backup interface [ 2805.003319][T15132] bond0: (slave bond_slave_1): Releasing backup interface [ 2805.088312][T15132] team0: Port device team_slave_0 removed [ 2805.138843][T15132] team0: Port device team_slave_1 removed [ 2805.151728][T15132] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2805.159761][T15132] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2805.175820][T15132] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2805.183799][T15132] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:48 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc4010000, {r0}}, 0x58) 17:23:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400059f000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0xa}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc4020000, {r0}}, 0x58) [ 2805.264663][T15135] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc4050000, {r0}}, 0x58) [ 2805.312577][T15141] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2805.352136][T15141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:23:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc5020000, {r0}}, 0x58) [ 2805.362585][T15141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc5050000, {r0}}, 0x58) 17:23:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc6010000, {r0}}, 0x58) 17:23:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc6030000, {r0}}, 0x58) [ 2805.545268][T15142] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2805.581285][T15142] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2805.591145][T15142] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2805.736746][T15140] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2805.775592][T15140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2805.784748][T15140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2806.002784][T15155] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2806.035225][T15155] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2806.043689][T15155] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc8000000, {r0}}, 0x58) 17:23:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0xc}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2806.151707][T15135] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2806.246658][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2806.272486][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2806.282457][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c000000100001040002a6000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc8010000, {r0}}, 0x58) 17:23:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xca030000, {r0}}, 0x58) 17:23:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0xf}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xcb010000, {r0}}, 0x58) [ 2806.517618][T15166] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xcc020000, {r0}}, 0x58) 17:23:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xcc030000, {r0}}, 0x58) [ 2806.592311][T15166] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2806.622263][T15166] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xcd030000, {r0}}, 0x58) 17:23:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xce020000, {r0}}, 0x58) [ 2806.922782][T15164] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2806.966125][T15164] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2806.984874][T15164] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2807.147939][T15172] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2807.218507][T15176] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2807.251213][T15176] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2807.259876][T15176] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c000000100001040000be000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:51 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xce030000, {r0}}, 0x58) 17:23:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2807.381782][T15288] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2807.424450][T15288] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2807.432941][T15288] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2807.500621][T15293] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2807.528874][T15293] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2807.537537][T15293] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2807.633210][T15291] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2807.938411][T14424] device hsr_slave_0 left promiscuous mode [ 2807.944749][T14424] device hsr_slave_1 left promiscuous mode [ 2807.955458][T14424] device veth1_macvtap left promiscuous mode [ 2807.961808][T14424] device veth0_macvtap left promiscuous mode [ 2807.967913][T14424] device veth1_vlan left promiscuous mode [ 2807.973805][T14424] device veth0_vlan left promiscuous mode [ 2808.105283][T14424] bond0 (unregistering): Released all slaves [ 2808.395423][T15396] chnl_net:caif_netlink_parms(): no params data found [ 2808.451150][T15396] bridge0: port 1(bridge_slave_0) entered blocking state [ 2808.458253][T15396] bridge0: port 1(bridge_slave_0) entered disabled state [ 2808.476711][T15396] device bridge_slave_0 entered promiscuous mode [ 2808.487783][T15396] bridge0: port 2(bridge_slave_1) entered blocking state [ 2808.494814][T15396] bridge0: port 2(bridge_slave_1) entered disabled state [ 2808.527710][T15396] device bridge_slave_1 entered promiscuous mode [ 2808.555616][T15396] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2808.578714][T15396] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2808.626593][T15396] team0: Port device team_slave_0 added [ 2808.637627][T15396] team0: Port device team_slave_1 added [ 2808.665541][T15396] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2808.672511][T15396] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2808.698686][T15396] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2808.727672][T15396] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2808.734651][T15396] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2808.760767][T15396] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2808.806355][T15396] device hsr_slave_0 entered promiscuous mode [ 2808.812964][T15396] device hsr_slave_1 entered promiscuous mode [ 2808.819340][T15396] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2808.827427][T15396] Cannot create hsr debugfs directory [ 2808.889794][T15396] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2808.902683][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2808.910719][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2808.922048][T15396] 8021q: adding VLAN 0 to HW filter on device team0 [ 2808.930993][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2808.940831][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2808.949355][T11867] bridge0: port 1(bridge_slave_0) entered blocking state [ 2808.956414][T11867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2808.975871][T15396] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2808.986342][T15396] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2809.001354][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2809.009304][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2809.019289][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2809.027944][T28225] bridge0: port 2(bridge_slave_1) entered blocking state [ 2809.034971][T28225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2809.044144][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2809.053270][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2809.063247][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2809.072083][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2809.082352][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2809.091047][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2809.101070][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2809.109481][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2809.119334][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2809.127050][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2809.141617][T15396] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2809.150333][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2809.157933][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2809.212986][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2809.269630][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2809.279769][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2809.287992][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2809.296698][T15396] device veth0_vlan entered promiscuous mode [ 2809.305836][T15396] device veth1_vlan entered promiscuous mode [ 2809.314380][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2809.331189][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2809.339719][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2809.350732][T15396] device veth0_macvtap entered promiscuous mode [ 2809.359375][T15396] device veth1_macvtap entered promiscuous mode [ 2809.371837][T15396] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2809.379125][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2809.387539][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2809.396496][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2809.406913][T15396] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2809.416729][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2809.425405][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2809.500108][T15424] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2809.525199][T15424] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2809.535460][T15424] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2809.558156][T15424] device bridge_slave_0 left promiscuous mode [ 2809.565021][T15424] bridge0: port 1(bridge_slave_0) entered disabled state [ 2809.582720][T15424] device bridge_slave_1 left promiscuous mode [ 2809.589820][T15424] bridge0: port 2(bridge_slave_1) entered disabled state [ 2809.610897][T15424] bond0: (slave bond_slave_0): Releasing backup interface [ 2809.649361][T15424] bond0: (slave bond_slave_1): Releasing backup interface [ 2809.726814][T15424] team0: Port device team_slave_0 removed [ 2809.772870][T15424] team0: Port device team_slave_1 removed [ 2809.783480][T15424] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2809.791349][T15424] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2809.808500][T15424] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2809.816340][T15424] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd0000000, {r0}}, 0x58) 17:23:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x10}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c000000100001040001c0000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd0020000, {r0}}, 0x58) [ 2809.902715][T15431] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd0030000, {r0}}, 0x58) 17:23:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd1020000, {r0}}, 0x58) [ 2809.993708][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd2000000, {r0}}, 0x58) [ 2810.039466][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2810.048310][T15433] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd2020000, {r0}}, 0x58) 17:23:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd4000000, {r0}}, 0x58) [ 2810.245847][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2810.284825][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2810.293431][T15432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2810.410285][T15427] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2810.422048][T15427] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2810.430231][T15427] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2810.529936][T15446] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2810.542556][T15446] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2810.550434][T15446] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd4010000, {r0}}, 0x58) 17:23:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x21}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2810.581068][T15431] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2810.686855][T15450] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2810.717027][T15450] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2810.725721][T15450] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd4030000, {r0}}, 0x58) 17:23:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c000000100001040005c4000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd6010000, {r0}}, 0x58) [ 2810.918425][T15455] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd8020000, {r0}}, 0x58) [ 2810.997262][T15455] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2811.019772][T15455] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd8030000, {r0}}, 0x58) 17:23:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xda000000, {r0}}, 0x58) 17:23:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xda030000, {r0}}, 0x58) 17:23:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x60}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xdaffffff, {r0}}, 0x58) [ 2811.284662][T15453] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2811.321337][T15453] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2811.345214][T15453] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xde020000, {r0}}, 0x58) [ 2811.428498][T15459] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2811.559513][T15461] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2811.611450][T15461] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2811.631423][T15461] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2811.818107][T15477] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2811.851874][T15477] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2811.860753][T15477] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2812.011808][T15481] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2812.031190][T15481] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2812.039977][T15481] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2812.082638][T15582] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2812.102688][T15582] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2812.114421][T15582] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2812.439486][T14424] device hsr_slave_0 left promiscuous mode [ 2812.445652][T14424] device hsr_slave_1 left promiscuous mode [ 2812.454759][T14424] device veth1_macvtap left promiscuous mode [ 2812.460839][T14424] device veth0_macvtap left promiscuous mode [ 2812.466934][T14424] device veth1_vlan left promiscuous mode [ 2812.472691][T14424] device veth0_vlan left promiscuous mode [ 2812.600893][T14424] bond0 (unregistering): Released all slaves [ 2812.932067][T15584] chnl_net:caif_netlink_parms(): no params data found [ 2812.986804][T15584] bridge0: port 1(bridge_slave_0) entered blocking state [ 2812.993897][T15584] bridge0: port 1(bridge_slave_0) entered disabled state [ 2813.002069][T15584] device bridge_slave_0 entered promiscuous mode [ 2813.009335][T15584] bridge0: port 2(bridge_slave_1) entered blocking state [ 2813.016413][T15584] bridge0: port 2(bridge_slave_1) entered disabled state [ 2813.024124][T15584] device bridge_slave_1 entered promiscuous mode [ 2813.041573][T15584] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2813.068290][T15584] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2813.109225][T15584] team0: Port device team_slave_0 added [ 2813.126853][T15584] team0: Port device team_slave_1 added [ 2813.156718][T15584] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2813.163669][T15584] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2813.189623][T15584] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2813.200931][T15584] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2813.208060][T15584] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2813.234099][T15584] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2813.275369][T15584] device hsr_slave_0 entered promiscuous mode [ 2813.283306][T15584] device hsr_slave_1 entered promiscuous mode [ 2813.290823][T15584] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2813.299298][T15584] Cannot create hsr debugfs directory [ 2813.335065][T15584] bridge0: port 2(bridge_slave_1) entered blocking state [ 2813.342133][T15584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2813.349389][T15584] bridge0: port 1(bridge_slave_0) entered blocking state [ 2813.356479][T15584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2813.389678][T15584] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2813.401352][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2813.409629][T28225] bridge0: port 1(bridge_slave_0) entered disabled state [ 2813.417565][T28225] bridge0: port 2(bridge_slave_1) entered disabled state [ 2813.438899][T15584] 8021q: adding VLAN 0 to HW filter on device team0 [ 2813.448874][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2813.457519][T28225] bridge0: port 1(bridge_slave_0) entered blocking state [ 2813.464632][T28225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2813.484261][T15584] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2813.494675][T15584] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2813.508516][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2813.517214][T11867] bridge0: port 2(bridge_slave_1) entered blocking state [ 2813.524289][T11867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2813.533429][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2813.542246][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2813.550974][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2813.559542][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2813.574106][T15584] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2813.583607][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2813.591180][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2813.598909][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2813.607165][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2813.655900][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2813.713395][T15584] device veth0_vlan entered promiscuous mode [ 2813.720531][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2813.730022][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2813.741235][T15584] device veth1_vlan entered promiscuous mode [ 2813.749305][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2813.757244][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2813.764919][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2813.780356][T15584] device veth0_macvtap entered promiscuous mode [ 2813.789141][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2813.797481][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2813.805874][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2813.816741][T15584] device veth1_macvtap entered promiscuous mode [ 2813.827639][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2813.835602][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2813.845289][T15584] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2813.852753][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2813.861988][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2813.872155][T15584] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2813.879648][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2813.888712][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2813.958433][T15612] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2813.982314][T15612] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2813.991223][T15612] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2814.009959][T15612] device bridge_slave_0 left promiscuous mode [ 2814.016816][T15612] bridge0: port 1(bridge_slave_0) entered disabled state [ 2814.031299][T15612] device bridge_slave_1 left promiscuous mode [ 2814.038198][T15612] bridge0: port 2(bridge_slave_1) entered disabled state [ 2814.057085][T15612] bond0: (slave bond_slave_0): Releasing backup interface [ 2814.094426][T15612] bond0: (slave bond_slave_1): Releasing backup interface [ 2814.172849][T15612] team0: Port device team_slave_0 removed [ 2814.223487][T15612] team0: Port device team_slave_1 removed [ 2814.235321][T15612] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2814.243391][T15612] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2814.258599][T15612] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2814.266479][T15612] batman_adv: batadv0: Removing interface: batadv_slave_1 17:23:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe0ffffff, {r0}}, 0x58) 17:23:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c000000100001040005c5000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe2030000, {r0}}, 0x58) 17:23:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe4010000, {r0}}, 0x58) 17:23:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe4020000, {r0}}, 0x58) [ 2814.424626][T15619] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2814.454548][T15619] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2814.463565][T15619] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe4030000, {r0}}, 0x58) 17:23:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe6000000, {r0}}, 0x58) 17:23:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2814.640397][T15620] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2814.675790][T15620] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2814.684602][T15620] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2814.786090][T15618] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2814.910443][T15622] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2814.946203][T15622] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2814.955266][T15622] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2815.134699][T15634] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2815.166966][T15634] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2815.175559][T15634] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r0, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe8010000, {r0}}, 0x58) 17:23:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x2}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c000000100001040001d4000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:23:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe8030000, {r0}}, 0x58) 17:23:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r0, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:23:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe9010000, {r0}}, 0x58) [ 2815.462030][T15738] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:23:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xea020000, {r0}}, 0x58) [ 2815.526463][T15738] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2815.536814][T15738] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:23:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xea030000, {r0}}, 0x58) 17:23:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xec010000, {r0}}, 0x58) 17:23:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xec030000, {r0}}, 0x58) 17:23:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xee000000, {r0}}, 0x58) 17:23:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2815.918948][T15742] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2815.977979][T15742] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2815.987157][T15742] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2816.155969][T15745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:23:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x3}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2816.263986][T15748] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2816.281441][T15748] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2816.289619][T15748] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2816.367906][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2816.400094][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2816.410557][T15762] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c000000100001040003f7000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:00 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xee010000, {r0}}, 0x58) 17:24:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2816.609248][T15866] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2816.648110][T15866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2816.656612][T15866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2816.788876][T15872] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2817.158465][T30727] device hsr_slave_0 left promiscuous mode [ 2817.164775][T30727] device hsr_slave_1 left promiscuous mode [ 2817.174677][T30727] device veth1_macvtap left promiscuous mode [ 2817.180720][T30727] device veth0_macvtap left promiscuous mode [ 2817.186827][T30727] device veth1_vlan left promiscuous mode [ 2817.192661][T30727] device veth0_vlan left promiscuous mode [ 2817.402929][T30727] bond0 (unregistering): Released all slaves [ 2817.563200][T15976] chnl_net:caif_netlink_parms(): no params data found [ 2817.600994][T15976] bridge0: port 1(bridge_slave_0) entered blocking state [ 2817.608121][T15976] bridge0: port 1(bridge_slave_0) entered disabled state [ 2817.617518][T15976] device bridge_slave_0 entered promiscuous mode [ 2817.624831][T15976] bridge0: port 2(bridge_slave_1) entered blocking state [ 2817.631957][T15976] bridge0: port 2(bridge_slave_1) entered disabled state [ 2817.639930][T15976] device bridge_slave_1 entered promiscuous mode [ 2817.657635][T15976] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2817.668057][T15976] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2817.686962][T15976] team0: Port device team_slave_0 added [ 2817.693336][T15976] team0: Port device team_slave_1 added [ 2817.708246][T15976] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2817.715190][T15976] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2817.741339][T15976] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2817.777402][T15976] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2817.784376][T15976] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2817.810326][T15976] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2817.858720][T15976] device hsr_slave_0 entered promiscuous mode [ 2817.877464][T15976] device hsr_slave_1 entered promiscuous mode [ 2817.886462][T15976] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2817.894017][T15976] Cannot create hsr debugfs directory [ 2817.996938][T15976] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2818.008059][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2818.015831][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2818.024712][T15976] 8021q: adding VLAN 0 to HW filter on device team0 [ 2818.034453][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2818.043737][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2818.053217][T28225] bridge0: port 1(bridge_slave_0) entered blocking state [ 2818.060268][T28225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2818.076969][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2818.085092][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2818.094533][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2818.102987][ T4533] bridge0: port 2(bridge_slave_1) entered blocking state [ 2818.110038][ T4533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2818.117779][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2818.126691][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2818.135328][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2818.143822][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2818.152476][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2818.160968][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2818.173109][T15976] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2818.183485][T15976] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2818.196535][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2818.204733][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2818.213353][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2818.227877][T15976] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2818.235327][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2818.243250][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2818.250955][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2818.302775][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2818.361914][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2818.372387][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2818.380615][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2818.390684][T15976] device veth0_vlan entered promiscuous mode [ 2818.399864][T15976] device veth1_vlan entered promiscuous mode [ 2818.414052][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2818.422313][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2818.432181][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2818.441597][T15976] device veth0_macvtap entered promiscuous mode [ 2818.451129][T15976] device veth1_macvtap entered promiscuous mode [ 2818.463377][T15976] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2818.471762][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2818.480165][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2818.490127][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2818.500671][T15976] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2818.509247][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2818.518059][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:24:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r0, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xefffffff, {r0}}, 0x58) 17:24:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x4}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c000000100001040003fa000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0020000, {r0}}, 0x58) 17:24:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0030000, {r0}}, 0x58) 17:24:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2818.596021][T16008] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:24:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff, {r0}}, 0x58) 17:24:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf2010000, {r0}}, 0x58) 17:24:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 2818.774628][T16010] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2818.836714][T16010] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2818.845984][T16010] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2819.001465][T16014] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2819.035385][T16014] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2819.044472][T16014] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, 0x0, 0x0) 17:24:02 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf2030000, {r0}}, 0x58) 17:24:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 17:24:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2819.205652][T16028] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2819.231009][T16028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2819.241751][T16028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x5}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2819.269372][T16008] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2819.328897][T16034] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2819.361235][T16034] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2819.369851][T16034] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2819.555798][T16036] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2819.589997][T16036] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2819.598866][T16036] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000ffe000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, 0x0, 0x0) 17:24:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 17:24:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf4000000, {r0}}, 0x58) 17:24:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf4030000, {r0}}, 0x58) 17:24:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x6}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2819.780633][T16043] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:24:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 17:24:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf6010000, {r0}}, 0x58) 17:24:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf6030000, {r0}}, 0x58) [ 2819.937021][T16042] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf8000000, {r0}}, 0x58) 17:24:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 2820.060650][T16042] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2820.095680][T16042] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2820.446857][T16052] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2820.500991][T16052] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2820.510791][T16052] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2820.635733][T16043] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2820.661407][T16061] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2820.673378][T16061] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2820.682237][T16061] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400fffe000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) [ 2820.738908][T16063] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2821.037990][T14432] device hsr_slave_0 left promiscuous mode [ 2821.044209][T14432] device hsr_slave_1 left promiscuous mode [ 2821.051921][T14432] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2821.059433][T14432] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2821.068697][T14432] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2821.076313][T14432] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2821.084046][T14432] device bridge_slave_1 left promiscuous mode [ 2821.090290][T14432] bridge0: port 2(bridge_slave_1) entered disabled state [ 2821.099869][T14432] device bridge_slave_0 left promiscuous mode [ 2821.106155][T14432] bridge0: port 1(bridge_slave_0) entered disabled state [ 2821.117859][T14432] device veth1_macvtap left promiscuous mode [ 2821.123926][T14432] device veth0_macvtap left promiscuous mode [ 2821.129957][T14432] device veth1_vlan left promiscuous mode [ 2821.135674][T14432] device veth0_vlan left promiscuous mode [ 2821.239979][T14432] team0 (unregistering): Port device team_slave_1 removed [ 2821.252219][T14432] team0 (unregistering): Port device team_slave_0 removed [ 2821.261882][T14432] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2821.274933][T14432] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2821.308462][T14432] bond0 (unregistering): Released all slaves [ 2821.866070][T16165] chnl_net:caif_netlink_parms(): no params data found [ 2821.904424][T16165] bridge0: port 1(bridge_slave_0) entered blocking state [ 2821.911488][T16165] bridge0: port 1(bridge_slave_0) entered disabled state [ 2821.920012][T16165] device bridge_slave_0 entered promiscuous mode [ 2821.927209][T16165] bridge0: port 2(bridge_slave_1) entered blocking state [ 2821.934236][T16165] bridge0: port 2(bridge_slave_1) entered disabled state [ 2821.942976][T16165] device bridge_slave_1 entered promiscuous mode [ 2821.961635][T16165] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2821.971879][T16165] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2821.995125][T16165] team0: Port device team_slave_0 added [ 2822.001502][T16165] team0: Port device team_slave_1 added [ 2822.017424][T16165] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2822.024377][T16165] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2822.051520][T16165] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2822.062764][T16165] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2822.069735][T16165] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2822.095843][T16165] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2822.121563][T16165] device hsr_slave_0 entered promiscuous mode [ 2822.128125][T16165] device hsr_slave_1 entered promiscuous mode [ 2822.134492][T16165] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2822.142059][T16165] Cannot create hsr debugfs directory [ 2822.180351][T16165] bridge0: port 2(bridge_slave_1) entered blocking state [ 2822.187512][T16165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2822.194826][T16165] bridge0: port 1(bridge_slave_0) entered blocking state [ 2822.201964][T16165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2822.237512][T16165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2822.249036][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2822.257391][T28225] bridge0: port 1(bridge_slave_0) entered disabled state [ 2822.265200][T28225] bridge0: port 2(bridge_slave_1) entered disabled state [ 2822.277942][T16165] 8021q: adding VLAN 0 to HW filter on device team0 [ 2822.298456][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2822.307168][T28225] bridge0: port 1(bridge_slave_0) entered blocking state [ 2822.314243][T28225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2822.322295][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2822.330768][T28225] bridge0: port 2(bridge_slave_1) entered blocking state [ 2822.337907][T28225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2822.347445][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2822.356376][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2822.368324][T16165] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2822.378727][T16165] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2822.391235][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2822.400700][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2822.409497][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2822.425234][T16165] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2822.433073][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2822.442160][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2822.449859][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2822.503154][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2822.565638][T16165] device veth0_vlan entered promiscuous mode [ 2822.574212][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2822.583106][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2822.592259][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2822.602435][T16165] device veth1_vlan entered promiscuous mode [ 2822.610495][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2822.625760][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2822.635558][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2822.645440][T16165] device veth0_macvtap entered promiscuous mode [ 2822.655263][T16165] device veth1_macvtap entered promiscuous mode [ 2822.670130][T16165] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2822.677593][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2822.688603][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2822.699019][T16165] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2822.708105][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:24:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, 0x0, 0x0) 17:24:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf8020000, {r0}}, 0x58) 17:24:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 17:24:06 executing program 4: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x7}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000fff000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf8030000, {r0}}, 0x58) 17:24:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 17:24:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfa030000, {r0}}, 0x58) 17:24:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 2822.848173][T16200] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfc000000, {r0}}, 0x58) [ 2822.895342][T16200] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2822.909381][T16200] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 2823.101935][T16198] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2823.134273][T16198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2823.143188][T16198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2823.246849][T16202] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:24:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 17:24:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfc030000, {r0}}, 0x58) 17:24:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x8}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:07 executing program 4: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104007fff000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfe000000, {r0}}, 0x58) 17:24:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 17:24:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfe030000, {r0}}, 0x58) 17:24:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfe80ffff, {r0}}, 0x58) [ 2823.477672][T16323] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfec0ffff, {r0}}, 0x58) [ 2823.549879][T16323] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2823.568212][T16323] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfeff0000, {r0}}, 0x58) 17:24:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 17:24:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x9}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2823.932150][T16321] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2823.993485][T16321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2824.011799][T16321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:07 executing program 4: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2824.203235][T16327] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2824.281871][T16346] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2824.313302][T16346] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2824.321897][T16346] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2824.478502][T16348] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2824.516318][T16348] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2824.529171][T16348] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400feff000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:08 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfeffffff, {r0}}, 0x58) [ 2824.698954][T16454] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2825.068692][T30727] device hsr_slave_0 left promiscuous mode [ 2825.074965][T30727] device hsr_slave_1 left promiscuous mode [ 2825.083380][T30727] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2825.090824][T30727] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2825.100325][T30727] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2825.107747][T30727] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2825.115453][T30727] device bridge_slave_1 left promiscuous mode [ 2825.121627][T30727] bridge0: port 2(bridge_slave_1) entered disabled state [ 2825.130686][T30727] device bridge_slave_0 left promiscuous mode [ 2825.136842][T30727] bridge0: port 1(bridge_slave_0) entered disabled state [ 2825.147158][T30727] device veth1_macvtap left promiscuous mode [ 2825.153159][T30727] device veth0_macvtap left promiscuous mode [ 2825.159216][T30727] device veth1_vlan left promiscuous mode [ 2825.164938][T30727] device veth0_vlan left promiscuous mode [ 2825.351455][T30727] team0 (unregistering): Port device team_slave_1 removed [ 2825.363772][T30727] team0 (unregistering): Port device team_slave_0 removed [ 2825.390035][T30727] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2825.401486][T30727] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2825.436347][T30727] bond0 (unregistering): Released all slaves [ 2825.569100][T16556] chnl_net:caif_netlink_parms(): no params data found [ 2825.605078][T16556] bridge0: port 1(bridge_slave_0) entered blocking state [ 2825.612182][T16556] bridge0: port 1(bridge_slave_0) entered disabled state [ 2825.620320][T16556] device bridge_slave_0 entered promiscuous mode [ 2825.628222][T16556] bridge0: port 2(bridge_slave_1) entered blocking state [ 2825.635369][T16556] bridge0: port 2(bridge_slave_1) entered disabled state [ 2825.643189][T16556] device bridge_slave_1 entered promiscuous mode [ 2825.660253][T16556] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2825.670619][T16556] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2825.709382][T16556] team0: Port device team_slave_0 added [ 2825.715717][T16556] team0: Port device team_slave_1 added [ 2825.748105][T16556] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2825.755050][T16556] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2825.781622][T16556] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2825.846782][T16556] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2825.853726][T16556] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2825.879732][T16556] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2825.958735][T16556] device hsr_slave_0 entered promiscuous mode [ 2825.977026][T16556] device hsr_slave_1 entered promiscuous mode [ 2825.983445][T16556] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2825.991177][T16556] Cannot create hsr debugfs directory [ 2826.037193][T16556] bridge0: port 2(bridge_slave_1) entered blocking state [ 2826.044841][T16556] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2826.052103][T16556] bridge0: port 1(bridge_slave_0) entered blocking state [ 2826.059230][T16556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2826.092183][T16556] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2826.103783][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2826.113968][T17120] bridge0: port 1(bridge_slave_0) entered disabled state [ 2826.121777][T17120] bridge0: port 2(bridge_slave_1) entered disabled state [ 2826.135270][T16556] 8021q: adding VLAN 0 to HW filter on device team0 [ 2826.145958][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2826.155207][ T7250] bridge0: port 1(bridge_slave_0) entered blocking state [ 2826.162237][ T7250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2826.183183][T16556] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2826.193597][T16556] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2826.208084][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2826.216648][T17120] bridge0: port 2(bridge_slave_1) entered blocking state [ 2826.223673][T17120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2826.232659][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2826.241569][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2826.250199][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2826.258674][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2826.273803][T16556] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2826.282648][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2826.291380][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2826.298895][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2826.306958][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2826.355159][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2826.413431][T16556] device veth0_vlan entered promiscuous mode [ 2826.421774][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2826.430925][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2826.440043][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2826.450548][T16556] device veth1_vlan entered promiscuous mode [ 2826.460805][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2826.478413][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2826.487137][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2826.496725][T16556] device veth0_macvtap entered promiscuous mode [ 2826.505211][T16556] device veth1_macvtap entered promiscuous mode [ 2826.518426][T16556] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2826.525678][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2826.534923][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2826.545284][T16556] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2826.553001][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2826.562169][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:24:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 17:24:10 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0xa}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 17:24:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xff000000, {r0}}, 0x58) 17:24:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000040030000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 17:24:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xff030000, {r0}}, 0x58) 17:24:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xff0f0000, {r0}}, 0x58) [ 2826.710776][T16591] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffff0000, {r0}}, 0x58) [ 2826.756713][T16591] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2826.768896][T16591] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffff0300, {r0}}, 0x58) 17:24:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffff1f00, {r0}}, 0x58) 17:24:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffff80fe, {r0}}, 0x58) [ 2826.988160][T16593] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2827.019228][T16593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2827.027697][T16593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:10 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2827.144970][T16594] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2827.234019][T16608] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2827.259430][T16608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2827.268546][T16608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2827.359222][T16612] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2827.393774][T16612] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2827.402606][T16612] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 17:24:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffc0fe, {r0}}, 0x58) 17:24:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 17:24:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0xc}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:11 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c0000001000010400ffff030000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:11 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 2827.563938][T16717] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:24:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, {r0}}, 0x58) [ 2827.647972][T16715] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffa7, {r0}}, 0x58) [ 2827.703758][T16715] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2827.728351][T16715] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffc3, {r0}}, 0x58) 17:24:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffda, {r0}}, 0x58) 17:24:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffe0, {r0}}, 0x58) 17:24:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffef, {r0}}, 0x58) [ 2827.998249][T16719] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfffffff0, {r0}}, 0x58) [ 2828.064672][T16719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2828.087967][T16719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2828.347696][T16722] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2828.394691][T16722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2828.416988][T16722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2828.512154][T16732] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2828.536336][T16732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2828.547860][T16732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0xf}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:12 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, {r0}}, 0x58) 17:24:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000040000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) [ 2828.657776][T16840] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2828.695674][T16840] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2828.704711][T16840] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2828.851229][T16842] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2828.901436][T16846] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2828.932347][T16846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2828.940638][T16846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2829.060449][T16854] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2829.072566][T16854] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2829.082057][T16854] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2829.358890][T30727] device hsr_slave_0 left promiscuous mode [ 2829.364999][T30727] device hsr_slave_1 left promiscuous mode [ 2829.372156][T30727] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2829.379599][T30727] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2829.389091][T30727] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2829.396526][T30727] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2829.404493][T30727] device bridge_slave_1 left promiscuous mode [ 2829.410756][T30727] bridge0: port 2(bridge_slave_1) entered disabled state [ 2829.419800][T30727] device bridge_slave_0 left promiscuous mode [ 2829.425918][T30727] bridge0: port 1(bridge_slave_0) entered disabled state [ 2829.437513][T30727] device veth1_macvtap left promiscuous mode [ 2829.443505][T30727] device veth0_macvtap left promiscuous mode [ 2829.449591][T30727] device veth1_vlan left promiscuous mode [ 2829.455378][T30727] device veth0_vlan left promiscuous mode [ 2829.660558][T30727] team0 (unregistering): Port device team_slave_1 removed [ 2829.672497][T30727] team0 (unregistering): Port device team_slave_0 removed [ 2829.684444][T30727] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2829.696081][T30727] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2829.730504][T30727] bond0 (unregistering): Released all slaves [ 2829.854182][T16949] chnl_net:caif_netlink_parms(): no params data found [ 2829.892754][T16949] bridge0: port 1(bridge_slave_0) entered blocking state [ 2829.899861][T16949] bridge0: port 1(bridge_slave_0) entered disabled state [ 2829.907516][T16949] device bridge_slave_0 entered promiscuous mode [ 2829.914743][T16949] bridge0: port 2(bridge_slave_1) entered blocking state [ 2829.921835][T16949] bridge0: port 2(bridge_slave_1) entered disabled state [ 2829.929490][T16949] device bridge_slave_1 entered promiscuous mode [ 2829.946730][T16949] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2829.959415][T16949] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2829.995643][T16949] team0: Port device team_slave_0 added [ 2830.028221][T16949] team0: Port device team_slave_1 added [ 2830.052866][T16949] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2830.059987][T16949] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2830.085883][T16949] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2830.146557][T16949] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2830.153605][T16949] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2830.179696][T16949] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2830.205466][T16949] device hsr_slave_0 entered promiscuous mode [ 2830.213504][T16949] device hsr_slave_1 entered promiscuous mode [ 2830.220100][T16949] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2830.228679][T16949] Cannot create hsr debugfs directory [ 2830.264784][T16949] bridge0: port 2(bridge_slave_1) entered blocking state [ 2830.271843][T16949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2830.279107][T16949] bridge0: port 1(bridge_slave_0) entered blocking state [ 2830.286237][T16949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2830.320062][T16949] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2830.332271][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2830.341081][ T7250] bridge0: port 1(bridge_slave_0) entered disabled state [ 2830.350417][ T7250] bridge0: port 2(bridge_slave_1) entered disabled state [ 2830.359619][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2830.372478][T16949] 8021q: adding VLAN 0 to HW filter on device team0 [ 2830.382915][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2830.392523][ T1924] bridge0: port 1(bridge_slave_0) entered blocking state [ 2830.399580][ T1924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2830.418465][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2830.427144][ T7250] bridge0: port 2(bridge_slave_1) entered blocking state [ 2830.434177][ T7250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2830.443469][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2830.452347][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2830.465252][T16949] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2830.475621][T16949] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2830.487804][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2830.496095][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2830.504947][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2830.519496][T16949] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2830.528314][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2830.535963][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2830.543698][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2830.600432][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2830.661616][T16949] device veth0_vlan entered promiscuous mode [ 2830.669821][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2830.678629][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2830.686281][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2830.696189][T16949] device veth1_vlan entered promiscuous mode [ 2830.709810][T16949] device veth0_macvtap entered promiscuous mode [ 2830.718736][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2830.727129][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2830.735371][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2830.745158][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2830.754444][T16949] device veth1_macvtap entered promiscuous mode [ 2830.767877][T16949] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2830.775158][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2830.786470][T16949] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2830.800232][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:24:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 17:24:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000800, {r0}}, 0x58) 17:24:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 17:24:14 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000100000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x10}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000000000, {r0}}, 0x58) [ 2830.872000][T16981] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:24:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa085ffffffff, {r0}}, 0x58) [ 2830.942734][T16986] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2830.979804][T16986] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:24:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffff00000000, {r0}}, 0x58) [ 2830.989075][T16986] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, {r0}}, 0x58) 17:24:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, {r0}}, 0x58) 17:24:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, {r0}}, 0x58) [ 2831.205686][T16987] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2831.241007][T16987] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2831.249625][T16987] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2831.425080][T16985] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2831.454938][T16985] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2831.465298][T16985] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:15 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000001000000, {r0}}, 0x58) 17:24:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x21}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2831.639958][T16981] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2831.732305][T17006] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2831.767113][T17006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2831.775702][T17006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2831.936966][T17007] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2831.971901][T17007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2831.980896][T17007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000003400000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:15 executing program 1: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:15 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, {r0}}, 0x58) 17:24:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x60}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:15 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, {r0}}, 0x58) 17:24:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:15 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x80000000008000, {r0}}, 0x58) [ 2832.259746][T17013] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xaded85ffffffff, {r0}}, 0x58) 17:24:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, {r0}}, 0x58) [ 2832.323711][T17013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2832.344342][T17013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x102000000000000, {r0}}, 0x58) 17:24:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, {r0}}, 0x58) [ 2832.615892][T17015] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2832.696915][T17015] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2832.717421][T17015] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2832.894358][T17017] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2832.989466][T17021] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2833.020624][T17021] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2833.029687][T17021] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2833.092403][T17032] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2833.116579][T17032] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2833.130357][T17032] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000100000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000fff000000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) [ 2833.195419][T17136] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2833.209602][T17138] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2833.518308][T30727] device hsr_slave_0 left promiscuous mode [ 2833.524577][T30727] device hsr_slave_1 left promiscuous mode [ 2833.532874][T30727] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2833.540342][T30727] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2833.549813][T30727] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2833.557279][T30727] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2833.565096][T30727] device bridge_slave_1 left promiscuous mode [ 2833.571310][T30727] bridge0: port 2(bridge_slave_1) entered disabled state [ 2833.580530][T30727] device bridge_slave_0 left promiscuous mode [ 2833.586861][T30727] bridge0: port 1(bridge_slave_0) entered disabled state [ 2833.606451][T30727] device veth1_macvtap left promiscuous mode [ 2833.612464][T30727] device veth0_macvtap left promiscuous mode [ 2833.618554][T30727] device veth1_vlan left promiscuous mode [ 2833.624356][T30727] device veth0_vlan left promiscuous mode [ 2833.730700][T30727] team0 (unregistering): Port device team_slave_1 removed [ 2833.742371][T30727] team0 (unregistering): Port device team_slave_0 removed [ 2833.752907][T30727] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2833.765985][T30727] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2833.799910][T30727] bond0 (unregistering): Released all slaves [ 2834.319230][T17240] chnl_net:caif_netlink_parms(): no params data found [ 2834.356833][T17240] bridge0: port 1(bridge_slave_0) entered blocking state [ 2834.363948][T17240] bridge0: port 1(bridge_slave_0) entered disabled state [ 2834.372889][T17240] device bridge_slave_0 entered promiscuous mode [ 2834.380575][T17240] bridge0: port 2(bridge_slave_1) entered blocking state [ 2834.387660][T17240] bridge0: port 2(bridge_slave_1) entered disabled state [ 2834.395419][T17240] device bridge_slave_1 entered promiscuous mode [ 2834.413676][T17240] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2834.424125][T17240] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2834.443293][T17240] team0: Port device team_slave_0 added [ 2834.449872][T17240] team0: Port device team_slave_1 added [ 2834.467267][T17240] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2834.474212][T17240] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2834.500184][T17240] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2834.512614][T17240] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2834.519746][T17240] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2834.545857][T17240] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2834.574378][T17240] device hsr_slave_0 entered promiscuous mode [ 2834.581881][T17240] device hsr_slave_1 entered promiscuous mode [ 2834.588511][T17240] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2834.596055][T17240] Cannot create hsr debugfs directory [ 2834.632003][T17240] bridge0: port 2(bridge_slave_1) entered blocking state [ 2834.639057][T17240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2834.646448][T17240] bridge0: port 1(bridge_slave_0) entered blocking state [ 2834.653481][T17240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2834.686704][T17240] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2834.698276][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2834.706691][ T1924] bridge0: port 1(bridge_slave_0) entered disabled state [ 2834.714674][ T1924] bridge0: port 2(bridge_slave_1) entered disabled state [ 2834.728093][T17240] 8021q: adding VLAN 0 to HW filter on device team0 [ 2834.738156][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2834.746773][ T1924] bridge0: port 1(bridge_slave_0) entered blocking state [ 2834.753963][ T1924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2834.774500][T17240] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2834.784969][T17240] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2834.801205][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2834.810027][ T7250] bridge0: port 2(bridge_slave_1) entered blocking state [ 2834.817101][ T7250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2834.826099][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2834.835123][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2834.843881][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2834.852434][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2834.866962][T17240] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2834.874295][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2834.881964][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2834.889693][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2834.897560][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2834.948326][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2835.015068][T17240] device veth0_vlan entered promiscuous mode [ 2835.022265][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2835.032523][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2835.040397][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2835.052069][T17240] device veth1_vlan entered promiscuous mode [ 2835.059042][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2835.076477][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2835.084921][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2835.095876][T17240] device veth0_macvtap entered promiscuous mode [ 2835.104372][T17240] device veth1_macvtap entered promiscuous mode [ 2835.117453][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2835.127297][T17240] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2835.136064][T17240] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2835.143485][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2835.152264][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2835.161413][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2835.170181][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:24:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x202000000000000, {r0}}, 0x58) 17:24:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000200000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x204000000000000, {r0}}, 0x58) [ 2835.242255][T17272] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:24:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, {r0}}, 0x58) [ 2835.335972][T17276] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, {r0}}, 0x58) 17:24:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, {r0}}, 0x58) [ 2835.376459][T17276] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2835.386849][T17276] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, {r0}}, 0x58) 17:24:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x601000000000000, {r0}}, 0x58) [ 2835.553741][T17273] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2835.586860][T17273] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2835.595363][T17273] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2835.772062][T17278] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2835.804578][T17278] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2835.813951][T17278] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2836.014391][T17291] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2836.027439][T17291] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2836.034941][T17291] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 17:24:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x604000000000000, {r0}}, 0x58) 17:24:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x2}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2836.088886][T17272] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2836.185469][T17295] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2836.213820][T17295] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2836.223111][T17295] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2836.374398][T17297] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2836.404725][T17297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2836.414485][T17297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2836.593953][T17299] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2836.626749][T17299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2836.635551][T17299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000300000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:20 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, {r0}}, 0x58) 17:24:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 17:24:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0xa}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2836.780370][T17301] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2836.834751][T17301] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:24:20 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, {r0}}, 0x58) [ 2836.887764][T17301] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:20 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x803000000000000, {r0}}, 0x58) 17:24:20 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x900000000000000, {r0}}, 0x58) 17:24:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2837.044928][T17304] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:20 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000, {r0}}, 0x58) 17:24:20 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa01000000000000, {r0}}, 0x58) [ 2837.100614][T17304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2837.119948][T17304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:20 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000, {r0}}, 0x58) [ 2837.449398][T17306] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2837.507768][T17306] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2837.527796][T17306] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2837.661856][T17308] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2837.741505][T17317] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2837.770692][T17317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2837.779466][T17317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:21 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:21 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000, {r0}}, 0x58) [ 2837.931969][T17429] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2838.198188][T14424] device hsr_slave_0 left promiscuous mode [ 2838.204365][T14424] device hsr_slave_1 left promiscuous mode [ 2838.211509][T14424] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2838.218929][T14424] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2838.228225][T14424] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2838.235715][T14424] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2838.243579][T14424] device bridge_slave_1 left promiscuous mode [ 2838.249731][T14424] bridge0: port 2(bridge_slave_1) entered disabled state [ 2838.258718][T14424] device bridge_slave_0 left promiscuous mode [ 2838.264929][T14424] bridge0: port 1(bridge_slave_0) entered disabled state [ 2838.275892][T14424] device veth1_macvtap left promiscuous mode [ 2838.282013][T14424] device veth0_macvtap left promiscuous mode [ 2838.288102][T14424] device veth1_vlan left promiscuous mode [ 2838.293831][T14424] device veth0_vlan left promiscuous mode [ 2838.400577][T14424] team0 (unregistering): Port device team_slave_1 removed [ 2838.412573][T14424] team0 (unregistering): Port device team_slave_0 removed [ 2838.422500][T14424] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2838.435706][T14424] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2838.469725][T14424] bond0 (unregistering): Released all slaves [ 2838.851504][T17531] chnl_net:caif_netlink_parms(): no params data found [ 2838.948805][T17531] bridge0: port 1(bridge_slave_0) entered blocking state [ 2838.955962][T17531] bridge0: port 1(bridge_slave_0) entered disabled state [ 2838.976821][T17531] device bridge_slave_0 entered promiscuous mode [ 2838.991677][T17531] bridge0: port 2(bridge_slave_1) entered blocking state [ 2838.998743][T17531] bridge0: port 2(bridge_slave_1) entered disabled state [ 2839.013315][T17531] device bridge_slave_1 entered promiscuous mode [ 2839.054078][T17531] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2839.077791][T17531] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2839.107274][T17531] team0: Port device team_slave_0 added [ 2839.113597][T17531] team0: Port device team_slave_1 added [ 2839.128950][T17531] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2839.135893][T17531] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2839.162210][T17531] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2839.173739][T17531] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2839.180712][T17531] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2839.206644][T17531] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2839.229874][T17531] device hsr_slave_0 entered promiscuous mode [ 2839.236516][T17531] device hsr_slave_1 entered promiscuous mode [ 2839.242889][T17531] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2839.250452][T17531] Cannot create hsr debugfs directory [ 2839.287838][T17531] bridge0: port 2(bridge_slave_1) entered blocking state [ 2839.294918][T17531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2839.302241][T17531] bridge0: port 1(bridge_slave_0) entered blocking state [ 2839.309263][T17531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2839.341235][T17531] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2839.352810][ T7250] bridge0: port 1(bridge_slave_0) entered disabled state [ 2839.361026][ T7250] bridge0: port 2(bridge_slave_1) entered disabled state [ 2839.371133][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2839.381276][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2839.390666][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2839.400227][T17531] 8021q: adding VLAN 0 to HW filter on device team0 [ 2839.410773][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2839.419232][ T7648] bridge0: port 1(bridge_slave_0) entered blocking state [ 2839.426266][ T7648] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2839.449055][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2839.457896][ T7250] bridge0: port 2(bridge_slave_1) entered blocking state [ 2839.464919][ T7250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2839.473779][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2839.482877][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2839.491520][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2839.499734][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2839.509204][T17531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2839.517819][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2839.531077][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2839.538624][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2839.548426][T17531] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2839.603384][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2839.662620][T17531] device veth0_vlan entered promiscuous mode [ 2839.670609][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2839.679477][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2839.688795][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2839.698817][T17531] device veth1_vlan entered promiscuous mode [ 2839.709527][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2839.717816][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2839.731701][T17531] device veth0_macvtap entered promiscuous mode [ 2839.741224][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2839.749982][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2839.760647][T17531] device veth1_macvtap entered promiscuous mode [ 2839.774222][T17531] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2839.781656][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2839.793545][T17531] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2839.801240][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:24:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 17:24:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000, {r0}}, 0x58) 17:24:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000500000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000, {r0}}, 0x58) 17:24:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000, {r0}}, 0x58) [ 2839.939607][T17568] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, {r0}}, 0x58) [ 2839.984088][T17568] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2839.999803][T17568] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1001000000000000, {r0}}, 0x58) 17:24:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1003000000000000, {r0}}, 0x58) 17:24:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000, {r0}}, 0x58) [ 2840.199755][T17569] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2840.235305][T17569] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2840.244514][T17569] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2840.378309][T17565] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2840.442575][T17561] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2840.472917][T17561] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2840.481746][T17561] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 17:24:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:24 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000, {r0}}, 0x58) 17:24:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2840.660075][T17565] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2840.769055][T17584] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2840.798469][T17584] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2840.807357][T17584] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:24 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000600000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 17:24:24 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000, {r0}}, 0x58) 17:24:24 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1403000000000000, {r0}}, 0x58) [ 2840.975530][T17586] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2841.006529][T17586] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2841.014977][T17586] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:24 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1600000000000000, {r0}}, 0x58) 17:24:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:24 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1602000000000000, {r0}}, 0x58) 17:24:24 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1802000000000000, {r0}}, 0x58) 17:24:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:24 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1a01000000000000, {r0}}, 0x58) 17:24:25 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1a02000000000000, {r0}}, 0x58) [ 2841.284772][T17590] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2841.331050][T17590] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2841.353456][T17590] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2841.543236][T17594] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2841.711428][T17606] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2841.761184][T17606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2841.771111][T17606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2841.892225][T17610] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2841.905701][T17610] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2841.913387][T17610] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:25 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000700000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) [ 2842.045904][T17712] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2842.075335][T17712] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2842.085188][T17712] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2842.189130][T17714] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2842.214608][T17716] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2842.225702][T17716] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2842.234819][T17716] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2842.538513][T14432] device hsr_slave_0 left promiscuous mode [ 2842.544721][T14432] device hsr_slave_1 left promiscuous mode [ 2842.551595][T14432] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2842.559029][T14432] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2842.568317][T14432] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2842.575696][T14432] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2842.583605][T14432] device bridge_slave_1 left promiscuous mode [ 2842.589853][T14432] bridge0: port 2(bridge_slave_1) entered disabled state [ 2842.599467][T14432] device bridge_slave_0 left promiscuous mode [ 2842.605572][T14432] bridge0: port 1(bridge_slave_0) entered disabled state [ 2842.615977][T14432] device veth1_macvtap left promiscuous mode [ 2842.622017][T14432] device veth0_macvtap left promiscuous mode [ 2842.628092][T14432] device veth1_vlan left promiscuous mode [ 2842.633817][T14432] device veth0_vlan left promiscuous mode [ 2842.736976][T14432] team0 (unregistering): Port device team_slave_1 removed [ 2842.747479][T14432] team0 (unregistering): Port device team_slave_0 removed [ 2842.760106][T14432] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2842.771951][T14432] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2842.817498][T14432] bond0 (unregistering): Released all slaves [ 2843.014985][T17818] chnl_net:caif_netlink_parms(): no params data found [ 2843.062591][T17818] bridge0: port 1(bridge_slave_0) entered blocking state [ 2843.069721][T17818] bridge0: port 1(bridge_slave_0) entered disabled state [ 2843.077935][T17818] device bridge_slave_0 entered promiscuous mode [ 2843.085218][T17818] bridge0: port 2(bridge_slave_1) entered blocking state [ 2843.092360][T17818] bridge0: port 2(bridge_slave_1) entered disabled state [ 2843.100282][T17818] device bridge_slave_1 entered promiscuous mode [ 2843.137895][T17818] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2843.161478][T17818] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2843.207332][T17818] team0: Port device team_slave_0 added [ 2843.213797][T17818] team0: Port device team_slave_1 added [ 2843.246943][T17818] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2843.253910][T17818] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2843.279846][T17818] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2843.337680][T17818] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2843.344630][T17818] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2843.370561][T17818] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2843.420141][T17818] device hsr_slave_0 entered promiscuous mode [ 2843.434747][T17818] device hsr_slave_1 entered promiscuous mode [ 2843.441519][T17818] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2843.449245][T17818] Cannot create hsr debugfs directory [ 2843.499046][T17818] bridge0: port 2(bridge_slave_1) entered blocking state [ 2843.506202][T17818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2843.513690][T17818] bridge0: port 1(bridge_slave_0) entered blocking state [ 2843.520733][T17818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2843.556249][T17818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2843.568859][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2843.577744][T17120] bridge0: port 1(bridge_slave_0) entered disabled state [ 2843.585859][T17120] bridge0: port 2(bridge_slave_1) entered disabled state [ 2843.598689][T17818] 8021q: adding VLAN 0 to HW filter on device team0 [ 2843.619402][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2843.628026][T17120] bridge0: port 1(bridge_slave_0) entered blocking state [ 2843.635060][T17120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2843.654172][T17818] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2843.664685][T17818] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2843.678570][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2843.686885][ T7250] bridge0: port 2(bridge_slave_1) entered blocking state [ 2843.693964][ T7250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2843.703199][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2843.713210][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2843.721922][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2843.731748][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2843.740404][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2843.749189][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2843.767501][T17818] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2843.774794][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2843.782894][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2843.841692][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2843.901945][T17818] device veth0_vlan entered promiscuous mode [ 2843.910195][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2843.919263][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2843.928350][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2843.937996][T17818] device veth1_vlan entered promiscuous mode [ 2843.947491][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2843.955667][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2843.971682][T17818] device veth0_macvtap entered promiscuous mode [ 2843.979673][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2843.989977][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2844.002497][T17818] device veth1_macvtap entered promiscuous mode [ 2844.016765][T17818] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2844.024104][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2844.033034][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2844.047273][T17818] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2844.056606][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2844.065075][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2844.136255][T17846] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2844.159921][T17846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2844.169067][T17846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 17:24:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1eae000000000000, {r0}}, 0x58) 17:24:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:28 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000800000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000, {r0}}, 0x58) [ 2844.299850][T14432] device hsr_slave_0 left promiscuous mode [ 2844.334543][T14432] device hsr_slave_1 left promiscuous mode 17:24:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, {r0}}, 0x58) [ 2844.372121][T14432] device veth1_macvtap left promiscuous mode [ 2844.378179][T14432] device veth0_macvtap left promiscuous mode [ 2844.384178][T14432] device veth1_vlan left promiscuous mode [ 2844.390011][T14432] device veth0_vlan left promiscuous mode 17:24:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2002000000000000, {r0}}, 0x58) 17:24:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2100000000000000, {r0}}, 0x58) 17:24:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2200000000000000, {r0}}, 0x58) 17:24:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2400000000000000, {r0}}, 0x58) [ 2844.760503][T14432] bond0 (unregistering): Released all slaves [ 2844.941695][T17848] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2845.006852][T17848] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2845.022121][T17848] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2845.130383][T17852] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:24:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2401000000000000, {r0}}, 0x58) 17:24:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2845.174069][T17854] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2845.187823][T17854] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2845.195210][T17854] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2845.259672][T17969] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2845.283710][T17969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2845.292756][T17969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2845.362813][T17973] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2845.392824][T17973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2845.402916][T17973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2846.292674][T17975] chnl_net:caif_netlink_parms(): no params data found [ 2846.332115][T17975] bridge0: port 1(bridge_slave_0) entered blocking state [ 2846.339183][T17975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2846.347966][T17975] device bridge_slave_0 entered promiscuous mode [ 2846.355203][T17975] bridge0: port 2(bridge_slave_1) entered blocking state [ 2846.362336][T17975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2846.370181][T17975] device bridge_slave_1 entered promiscuous mode [ 2846.383737][T14432] device hsr_slave_0 left promiscuous mode [ 2846.390081][T14432] device hsr_slave_1 left promiscuous mode [ 2846.396448][T14432] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2846.403922][T14432] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2846.412068][T14432] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2846.419556][T14432] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2846.428133][T14432] device bridge_slave_1 left promiscuous mode [ 2846.434414][T14432] bridge0: port 2(bridge_slave_1) entered disabled state [ 2846.442378][T14432] device bridge_slave_0 left promiscuous mode [ 2846.448630][T14432] bridge0: port 1(bridge_slave_0) entered disabled state [ 2846.458848][T14432] device veth1_macvtap left promiscuous mode [ 2846.464837][T14432] device veth0_macvtap left promiscuous mode [ 2846.470904][T14432] device veth1_vlan left promiscuous mode [ 2846.476654][T14432] device veth0_vlan left promiscuous mode [ 2846.579234][T14432] team0 (unregistering): Port device team_slave_1 removed [ 2846.589491][T14432] team0 (unregistering): Port device team_slave_0 removed [ 2846.600223][T14432] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2846.611997][T14432] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2846.644845][T14432] bond0 (unregistering): Released all slaves [ 2846.714376][T17975] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2846.726575][T17975] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2846.748108][T17975] team0: Port device team_slave_0 added [ 2846.754601][T17975] team0: Port device team_slave_1 added [ 2846.771245][T17975] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2846.778242][T17975] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2846.804343][T17975] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2846.817409][T17975] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2846.824356][T17975] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2846.850509][T17975] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2846.874601][T17975] device hsr_slave_0 entered promiscuous mode [ 2846.882398][T17975] device hsr_slave_1 entered promiscuous mode [ 2846.888820][T17975] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2846.897357][T17975] Cannot create hsr debugfs directory [ 2846.934014][T17975] bridge0: port 2(bridge_slave_1) entered blocking state [ 2846.941146][T17975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2846.948421][T17975] bridge0: port 1(bridge_slave_0) entered blocking state [ 2846.955511][T17975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2846.984664][T17975] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2846.996138][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2847.004484][ T1924] bridge0: port 1(bridge_slave_0) entered disabled state [ 2847.012560][ T1924] bridge0: port 2(bridge_slave_1) entered disabled state [ 2847.024386][T17975] 8021q: adding VLAN 0 to HW filter on device team0 [ 2847.048974][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2847.057366][ T1924] bridge0: port 1(bridge_slave_0) entered blocking state [ 2847.064376][ T1924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2847.083437][T17975] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2847.093897][T17975] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2847.107669][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2847.116072][T17120] bridge0: port 2(bridge_slave_1) entered blocking state [ 2847.123112][T17120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2847.132275][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2847.141212][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2847.150274][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2847.158884][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2847.173218][T17975] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2847.182444][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2847.190237][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2847.205100][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2847.220082][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2847.262244][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2847.271052][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2847.371581][T17975] device veth0_vlan entered promiscuous mode [ 2847.379592][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2847.387902][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2847.399230][T17975] device veth1_vlan entered promiscuous mode [ 2847.406271][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2847.414172][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2847.423029][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2847.437860][T17975] device veth0_macvtap entered promiscuous mode [ 2847.445292][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2847.453446][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2847.462821][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2847.472682][T17975] device veth1_macvtap entered promiscuous mode [ 2847.480606][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2847.488731][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2847.500364][T17975] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2847.507862][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2847.516604][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2847.527016][T17975] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2847.536987][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2847.545499][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2847.605081][T18003] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2847.627399][T18003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2847.635985][T18003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2847.654543][T18003] device bridge_slave_0 left promiscuous mode [ 2847.661657][T18003] bridge0: port 1(bridge_slave_0) entered disabled state [ 2847.677618][T18003] device bridge_slave_1 left promiscuous mode [ 2847.684380][T18003] bridge0: port 2(bridge_slave_1) entered disabled state [ 2847.702787][T18003] bond0: (slave bond_slave_0): Releasing backup interface [ 2847.738687][T18003] bond0: (slave bond_slave_1): Releasing backup interface [ 2847.814243][T18003] team0: Port device team_slave_0 removed [ 2847.866496][T18003] team0: Port device team_slave_1 removed [ 2847.877823][T18003] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2847.885593][T18003] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2847.900073][T18003] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2847.908043][T18003] batman_adv: batadv0: Removing interface: batadv_slave_1 17:24:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2500000000000000, {r0}}, 0x58) 17:24:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000900000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2503000000000000, {r0}}, 0x58) [ 2848.002252][T18006] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:24:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2600000000000000, {r0}}, 0x58) 17:24:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2601000000000000, {r0}}, 0x58) [ 2848.157982][T18011] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2603000000000000, {r0}}, 0x58) [ 2848.214224][T18011] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2848.226675][T18011] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000, {r0}}, 0x58) 17:24:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2a00000000000000, {r0}}, 0x58) 17:24:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2a02000000000000, {r0}}, 0x58) [ 2848.577953][T18010] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2848.631031][T18010] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2848.666921][T18010] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2848.877683][T18026] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2848.890168][T18026] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2848.908738][T18026] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2849.428701][T14432] device hsr_slave_0 left promiscuous mode [ 2849.435054][T14432] device hsr_slave_1 left promiscuous mode [ 2849.444328][T14432] device veth1_macvtap left promiscuous mode [ 2849.450492][T14432] device veth0_macvtap left promiscuous mode [ 2849.456517][T14432] device veth1_vlan left promiscuous mode [ 2849.462260][T14432] device veth0_vlan left promiscuous mode [ 2849.582878][T14432] bond0 (unregistering): Released all slaves [ 2850.040807][T18128] chnl_net:caif_netlink_parms(): no params data found [ 2850.127341][T18128] bridge0: port 1(bridge_slave_0) entered blocking state [ 2850.134554][T18128] bridge0: port 1(bridge_slave_0) entered disabled state [ 2850.143003][T18128] device bridge_slave_0 entered promiscuous mode [ 2850.150946][T18128] bridge0: port 2(bridge_slave_1) entered blocking state [ 2850.158036][T18128] bridge0: port 2(bridge_slave_1) entered disabled state [ 2850.165606][T18128] device bridge_slave_1 entered promiscuous mode [ 2850.201768][T18128] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2850.213431][T18128] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2850.235999][T18128] team0: Port device team_slave_0 added [ 2850.242552][T18128] team0: Port device team_slave_1 added [ 2850.258297][T18128] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2850.265240][T18128] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2850.291302][T18128] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2850.302689][T18128] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2850.309660][T18128] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2850.335673][T18128] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2850.359083][T18128] device hsr_slave_0 entered promiscuous mode [ 2850.365521][T18128] device hsr_slave_1 entered promiscuous mode [ 2850.374360][T18128] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2850.383055][T18128] Cannot create hsr debugfs directory [ 2850.419938][T18128] bridge0: port 2(bridge_slave_1) entered blocking state [ 2850.427014][T18128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2850.434260][T18128] bridge0: port 1(bridge_slave_0) entered blocking state [ 2850.441306][T18128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2850.472052][T18128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2850.483401][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2850.493216][T28225] bridge0: port 1(bridge_slave_0) entered disabled state [ 2850.501313][T28225] bridge0: port 2(bridge_slave_1) entered disabled state [ 2850.514203][T18128] 8021q: adding VLAN 0 to HW filter on device team0 [ 2850.524424][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2850.533847][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2850.540986][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2850.558961][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2850.567450][T28225] bridge0: port 2(bridge_slave_1) entered blocking state [ 2850.574643][T28225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2850.584047][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2850.592887][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2850.606539][T18128] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2850.617199][T18128] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2850.630007][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2850.638612][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2850.647322][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2850.661606][T18128] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2850.670724][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2850.678421][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2850.685867][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2850.741656][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2850.800613][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2850.809479][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2850.818459][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2850.828053][T18128] device veth0_vlan entered promiscuous mode [ 2850.838361][T18128] device veth1_vlan entered promiscuous mode [ 2850.851628][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2850.860687][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2850.869207][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2850.879710][T18128] device veth0_macvtap entered promiscuous mode [ 2850.887453][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2850.898340][T18128] device veth1_macvtap entered promiscuous mode [ 2850.910506][T18128] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2850.919341][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2850.928226][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2850.939513][T18128] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2850.947211][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2850.955919][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2851.018422][T18156] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2851.038600][T18156] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2851.047192][T18156] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2851.064866][T18156] device bridge_slave_0 left promiscuous mode [ 2851.071795][T18156] bridge0: port 1(bridge_slave_0) entered disabled state [ 2851.087556][T18156] device bridge_slave_1 left promiscuous mode [ 2851.094278][T18156] bridge0: port 2(bridge_slave_1) entered disabled state [ 2851.112440][T18156] bond0: (slave bond_slave_0): Releasing backup interface [ 2851.151960][T18156] bond0: (slave bond_slave_1): Releasing backup interface [ 2851.235611][T18156] team0: Port device team_slave_0 removed [ 2851.286839][T18156] team0: Port device team_slave_1 removed [ 2851.298104][T18156] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2851.305915][T18156] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2851.320516][T18156] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2851.328457][T18156] batman_adv: batadv0: Removing interface: batadv_slave_1 17:24:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2a03000000000000, {r0}}, 0x58) 17:24:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2851.434263][T18163] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2851.461158][T18163] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:24:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2c02000000000000, {r0}}, 0x58) [ 2851.480931][T18163] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2c03000000000000, {r0}}, 0x58) 17:24:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2e01000000000000, {r0}}, 0x58) [ 2851.595323][T18158] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2e03000000000000, {r0}}, 0x58) [ 2851.650526][T18158] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2851.672489][T18158] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2f00000000000000, {r0}}, 0x58) [ 2851.891357][T18160] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2851.991088][T18166] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2852.044103][T18166] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2852.063376][T18166] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2852.219618][T18174] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2852.234031][T18174] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2852.242192][T18174] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:36 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2f01000000000000, {r0}}, 0x58) 17:24:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2852.274590][T18179] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2852.301703][T18179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:24:36 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3000000000000000, {r0}}, 0x58) [ 2852.329814][T18179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2852.410150][T18285] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2852.445883][T18285] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2852.454810][T18285] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2852.549033][T18286] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2852.559979][T18286] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2852.569506][T18286] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2853.527488][T18290] chnl_net:caif_netlink_parms(): no params data found [ 2853.566835][T18290] bridge0: port 1(bridge_slave_0) entered blocking state [ 2853.573904][T18290] bridge0: port 1(bridge_slave_0) entered disabled state [ 2853.581845][T18290] device bridge_slave_0 entered promiscuous mode [ 2853.589427][T18290] bridge0: port 2(bridge_slave_1) entered blocking state [ 2853.596572][T18290] bridge0: port 2(bridge_slave_1) entered disabled state [ 2853.604408][T18290] device bridge_slave_1 entered promiscuous mode [ 2853.621949][T18290] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2853.632665][T18290] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2853.652735][T18290] team0: Port device team_slave_0 added [ 2853.660798][T18290] team0: Port device team_slave_1 added [ 2853.677523][T18290] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2853.684455][T18290] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2853.710430][T18290] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2853.721698][T18290] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2853.728670][T18290] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2853.754586][T18290] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2853.777577][T18290] device hsr_slave_0 entered promiscuous mode [ 2853.784084][T18290] device hsr_slave_1 entered promiscuous mode [ 2853.790420][T18290] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2853.797970][T18290] Cannot create hsr debugfs directory [ 2853.835276][T18290] bridge0: port 2(bridge_slave_1) entered blocking state [ 2853.842340][T18290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2853.849742][T18290] bridge0: port 1(bridge_slave_0) entered blocking state [ 2853.856798][T18290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2853.887807][T18290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2853.898228][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2853.906683][T28225] bridge0: port 1(bridge_slave_0) entered disabled state [ 2853.914563][T28225] bridge0: port 2(bridge_slave_1) entered disabled state [ 2853.924245][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2853.935214][T18290] 8021q: adding VLAN 0 to HW filter on device team0 [ 2853.945562][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2853.954069][T28225] bridge0: port 1(bridge_slave_0) entered blocking state [ 2853.961104][T28225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2853.977115][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2853.985495][T28225] bridge0: port 2(bridge_slave_1) entered blocking state [ 2853.992563][T28225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2854.001688][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2854.015718][T18290] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2854.026125][T18290] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2854.039398][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2854.047738][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2854.056494][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2854.064897][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2854.079575][T18290] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2854.088496][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2854.095942][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2854.103627][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2854.162140][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2854.226420][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2854.234929][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2854.244444][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2854.252921][T18290] device veth0_vlan entered promiscuous mode [ 2854.263786][T18290] device veth1_vlan entered promiscuous mode [ 2854.278194][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2854.286644][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2854.294975][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2854.306288][T18290] device veth0_macvtap entered promiscuous mode [ 2854.314433][T18290] device veth1_macvtap entered promiscuous mode [ 2854.327906][T18290] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2854.335231][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2854.345262][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2854.355610][T18290] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2854.363615][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2854.437864][T18318] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2854.464652][T18318] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2854.473566][T18318] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2854.494953][T18318] device bridge_slave_0 left promiscuous mode [ 2854.502451][T18318] bridge0: port 1(bridge_slave_0) entered disabled state [ 2854.521067][T18318] device bridge_slave_1 left promiscuous mode [ 2854.527928][T18318] bridge0: port 2(bridge_slave_1) entered disabled state [ 2854.549264][T18318] bond0: (slave bond_slave_0): Releasing backup interface [ 2854.589257][T18318] bond0: (slave bond_slave_1): Releasing backup interface [ 2854.678388][T18318] team0: Port device team_slave_0 removed [ 2854.732590][T18318] team0: Port device team_slave_1 removed [ 2854.743996][T18318] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2854.752384][T18318] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2854.767467][T18318] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2854.775115][T18318] batman_adv: batadv0: Removing interface: batadv_slave_1 17:24:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000b00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3002000000000000, {r0}}, 0x58) 17:24:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3101000000000000, {r0}}, 0x58) [ 2854.868175][T18322] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:24:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3402000000000000, {r0}}, 0x58) [ 2854.910606][T18325] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2854.933745][T18325] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2854.944422][T18325] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3600000000000000, {r0}}, 0x58) 17:24:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3603000000000000, {r0}}, 0x58) 17:24:38 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3800000000000000, {r0}}, 0x58) [ 2855.035420][T18328] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2855.081598][T18328] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2855.091319][T18328] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2855.265597][T18326] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2855.299427][T18326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2855.309052][T18326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2855.515720][T18336] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2855.527609][T18336] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2855.535076][T18336] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2855.563830][T18322] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:24:39 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000c00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3a00000000000000, {r0}}, 0x58) 17:24:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xc}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x88a8ffff, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc0, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x60, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe4}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3a01000000000000, {r0}}, 0x58) 17:24:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3a02000000000000, {r0}}, 0x58) [ 2855.712167][T18348] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2855.741015][T18348] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2855.753258][T18348] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3a03000000000000, {r0}}, 0x58) [ 2855.892532][T18349] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, {r0}}, 0x58) 17:24:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, {r0}}, 0x58) [ 2855.945934][T18349] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2855.976861][T18349] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2856.123968][T18350] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2856.175588][T18350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2856.195359][T18350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2856.348561][T18352] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2856.435951][T18362] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2856.481223][T18362] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2856.489913][T18362] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:40 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000d00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:40 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4003000000000000, {r0}}, 0x58) 17:24:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xf}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:40 executing program 0: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2856.671261][T18469] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2856.713693][T18474] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2856.731729][T18474] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2856.741042][T18474] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2856.814497][T18473] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2856.855234][T18473] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2856.865016][T18473] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2857.069270][T18469] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2857.390676][T14424] device hsr_slave_0 left promiscuous mode [ 2857.397011][T14424] device hsr_slave_1 left promiscuous mode [ 2857.405967][T14424] device veth1_macvtap left promiscuous mode [ 2857.411989][T14424] device veth0_macvtap left promiscuous mode [ 2857.417995][T14424] device veth1_vlan left promiscuous mode [ 2857.423749][T14424] device veth0_vlan left promiscuous mode [ 2857.646587][T14424] bond0 (unregistering): Released all slaves [ 2857.802194][T18478] chnl_net:caif_netlink_parms(): no params data found [ 2857.838852][T18478] bridge0: port 1(bridge_slave_0) entered blocking state [ 2857.845967][T18478] bridge0: port 1(bridge_slave_0) entered disabled state [ 2857.855035][T18478] device bridge_slave_0 entered promiscuous mode [ 2857.862433][T18478] bridge0: port 2(bridge_slave_1) entered blocking state [ 2857.869532][T18478] bridge0: port 2(bridge_slave_1) entered disabled state [ 2857.879199][T18478] device bridge_slave_1 entered promiscuous mode [ 2857.899056][T18478] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2857.909589][T18478] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2857.930215][T18478] team0: Port device team_slave_0 added [ 2857.937929][T18478] team0: Port device team_slave_1 added [ 2857.959469][T18478] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2857.966551][T18478] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2857.992546][T18478] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2858.046718][T18478] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2858.053732][T18478] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2858.079759][T18478] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2858.108674][T18478] device hsr_slave_0 entered promiscuous mode [ 2858.126560][T18478] device hsr_slave_1 entered promiscuous mode [ 2858.132999][T18478] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2858.140574][T18478] Cannot create hsr debugfs directory [ 2858.211227][T18478] bridge0: port 2(bridge_slave_1) entered blocking state [ 2858.218283][T18478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2858.225551][T18478] bridge0: port 1(bridge_slave_0) entered blocking state [ 2858.232612][T18478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2858.268102][T18478] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2858.280341][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2858.288967][T16602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2858.297181][T16602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2858.309550][T18478] 8021q: adding VLAN 0 to HW filter on device team0 [ 2858.338832][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2858.347473][T28225] bridge0: port 1(bridge_slave_0) entered blocking state [ 2858.354513][T28225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2858.362384][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2858.371001][T28225] bridge0: port 2(bridge_slave_1) entered blocking state [ 2858.378050][T28225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2858.386847][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2858.400749][T18478] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2858.411118][T18478] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2858.426398][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2858.434558][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2858.443277][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2858.451811][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2858.466025][T18478] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2858.473699][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2858.481695][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2858.489385][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2858.547157][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2858.555865][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2858.616953][T18478] device veth0_vlan entered promiscuous mode [ 2858.623540][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2858.633419][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2858.646485][T18478] device veth1_vlan entered promiscuous mode [ 2858.657526][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2858.665413][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2858.673889][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2858.682717][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2858.696613][T18478] device veth0_macvtap entered promiscuous mode [ 2858.704569][T18478] device veth1_macvtap entered promiscuous mode [ 2858.713249][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2858.721972][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2858.731672][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2858.747768][T18478] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2858.755737][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2858.764949][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2858.773657][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2858.788239][T18478] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2858.795827][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2858.804417][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2858.882191][T18506] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2858.903647][T18506] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2858.912679][T18506] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2858.931062][T18506] device bridge_slave_0 left promiscuous mode [ 2858.937766][T18506] bridge0: port 1(bridge_slave_0) entered disabled state [ 2858.951647][T18506] device bridge_slave_1 left promiscuous mode [ 2858.958466][T18506] bridge0: port 2(bridge_slave_1) entered disabled state [ 2858.976283][T18506] bond0: (slave bond_slave_0): Releasing backup interface [ 2859.014457][T18506] bond0: (slave bond_slave_1): Releasing backup interface [ 2859.092892][T18506] team0: Port device team_slave_0 removed [ 2859.141172][T18506] team0: Port device team_slave_1 removed [ 2859.152415][T18506] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2859.160634][T18506] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2859.175038][T18506] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2859.182956][T18506] batman_adv: batadv0: Removing interface: batadv_slave_1 17:24:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4100000000000000, {r0}}, 0x58) 17:24:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x10}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:43 executing program 0: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2859.227307][T14424] device hsr_slave_0 left promiscuous mode [ 2859.233633][T14424] device hsr_slave_1 left promiscuous mode [ 2859.253209][T14424] device veth1_macvtap left promiscuous mode [ 2859.259357][T14424] device veth0_macvtap left promiscuous mode [ 2859.265457][T14424] device veth1_vlan left promiscuous mode [ 2859.271256][T14424] device veth0_vlan left promiscuous mode 17:24:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000e00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4203000000000000, {r0}}, 0x58) 17:24:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4400000000000000, {r0}}, 0x58) 17:24:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4401000000000000, {r0}}, 0x58) 17:24:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4600000000000000, {r0}}, 0x58) 17:24:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4603000000000000, {r0}}, 0x58) [ 2859.572376][T14424] bond0 (unregistering): Released all slaves 17:24:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000, {r0}}, 0x58) [ 2859.643120][T18509] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2859.679558][T18509] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2859.698989][T18509] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2859.833245][T18512] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2859.885380][T18512] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2859.916857][T18512] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4a00000000000000, {r0}}, 0x58) 17:24:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x21}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2860.131464][T18514] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2860.189469][T18529] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2860.210385][T18529] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2860.222802][T18529] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2860.297122][T18546] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2860.329771][T18546] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2860.338410][T18546] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2860.469112][T18634] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2860.481323][T18634] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2860.489204][T18634] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2861.310277][T18636] chnl_net:caif_netlink_parms(): no params data found [ 2861.320556][T14424] device hsr_slave_0 left promiscuous mode [ 2861.327526][T14424] device hsr_slave_1 left promiscuous mode [ 2861.336217][T14424] device veth1_macvtap left promiscuous mode [ 2861.342201][T14424] device veth0_macvtap left promiscuous mode [ 2861.348285][T14424] device veth1_vlan left promiscuous mode [ 2861.353998][T14424] device veth0_vlan left promiscuous mode [ 2861.482430][T14424] bond0 (unregistering): Released all slaves [ 2861.608673][T18636] bridge0: port 1(bridge_slave_0) entered blocking state [ 2861.615722][T18636] bridge0: port 1(bridge_slave_0) entered disabled state [ 2861.624879][T18636] device bridge_slave_0 entered promiscuous mode [ 2861.632509][T18636] bridge0: port 2(bridge_slave_1) entered blocking state [ 2861.639918][T18636] bridge0: port 2(bridge_slave_1) entered disabled state [ 2861.649577][T18636] device bridge_slave_1 entered promiscuous mode [ 2861.668529][T18636] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2861.679755][T18636] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2861.698689][T18636] team0: Port device team_slave_0 added [ 2861.705096][T18636] team0: Port device team_slave_1 added [ 2861.721852][T18636] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2861.728858][T18636] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2861.754878][T18636] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2861.767594][T18636] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2861.774622][T18636] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2861.800559][T18636] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2861.825570][T18636] device hsr_slave_0 entered promiscuous mode [ 2861.833420][T18636] device hsr_slave_1 entered promiscuous mode [ 2861.840037][T18636] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2861.848558][T18636] Cannot create hsr debugfs directory [ 2861.904492][T18636] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2861.915558][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2861.923886][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2861.933460][T18636] 8021q: adding VLAN 0 to HW filter on device team0 [ 2861.942452][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2861.951979][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2861.960405][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2861.967443][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2861.985215][T18636] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2861.995685][T18636] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2862.009307][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2862.017405][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2862.025818][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2862.035130][ T4533] bridge0: port 2(bridge_slave_1) entered blocking state [ 2862.042196][ T4533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2862.051173][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2862.059958][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2862.069996][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2862.078506][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2862.088279][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2862.096966][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2862.105637][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2862.114690][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2862.128318][T18636] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2862.137100][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2862.144932][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2862.160412][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2862.175408][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2862.220342][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2862.281042][T18636] device veth0_vlan entered promiscuous mode [ 2862.289308][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2862.298058][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2862.305718][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2862.316500][T18636] device veth1_vlan entered promiscuous mode [ 2862.327854][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2862.335876][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2862.347282][T18636] device veth0_macvtap entered promiscuous mode [ 2862.355174][T18636] device veth1_macvtap entered promiscuous mode [ 2862.364990][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2862.378026][T18636] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2862.387948][T18636] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2862.395205][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2862.404503][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2862.413370][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2862.475855][T18664] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2862.497228][T18664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2862.505635][T18664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2862.524063][T18664] device bridge_slave_0 left promiscuous mode [ 2862.531031][T18664] bridge0: port 1(bridge_slave_0) entered disabled state [ 2862.545442][T18664] device bridge_slave_1 left promiscuous mode [ 2862.552359][T18664] bridge0: port 2(bridge_slave_1) entered disabled state [ 2862.569797][T18664] bond0: (slave bond_slave_0): Releasing backup interface [ 2862.605891][T18664] bond0: (slave bond_slave_1): Releasing backup interface [ 2862.678376][T18664] team0: Port device team_slave_0 removed [ 2862.725330][T18664] team0: Port device team_slave_1 removed [ 2862.735824][T18664] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2862.743636][T18664] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2862.757445][T18664] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2862.765083][T18664] batman_adv: batadv0: Removing interface: batadv_slave_1 17:24:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x10}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000020e00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4a02000000000000, {r0}}, 0x58) 17:24:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x60}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000, {r0}}, 0x58) 17:24:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4d02000000000000, {r0}}, 0x58) [ 2862.961937][T18670] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4e02000000000000, {r0}}, 0x58) [ 2863.033381][T18670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2863.056530][T18670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5100000000000000, {r0}}, 0x58) 17:24:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5200000000000000, {r0}}, 0x58) 17:24:46 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5203000000000000, {r0}}, 0x58) [ 2863.284125][T18666] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2863.391070][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2863.442580][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2863.462013][T18672] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2863.655482][T18674] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2863.684708][T18674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2863.693303][T18674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x10}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2863.775307][T18688] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2863.798680][T18688] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2863.811796][T18688] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2863.882582][T18790] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2863.911407][T18790] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2863.920062][T18790] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2864.845628][T18792] chnl_net:caif_netlink_parms(): no params data found [ 2864.882846][T18792] bridge0: port 1(bridge_slave_0) entered blocking state [ 2864.889954][T18792] bridge0: port 1(bridge_slave_0) entered disabled state [ 2864.897595][T18792] device bridge_slave_0 entered promiscuous mode [ 2864.904858][T18792] bridge0: port 2(bridge_slave_1) entered blocking state [ 2864.911985][T18792] bridge0: port 2(bridge_slave_1) entered disabled state [ 2864.919605][T18792] device bridge_slave_1 entered promiscuous mode [ 2864.936257][T18792] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2864.946562][T18792] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2864.964811][T18792] team0: Port device team_slave_0 added [ 2864.971293][T18792] team0: Port device team_slave_1 added [ 2864.988608][T18792] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2864.995635][T18792] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2865.021541][T18792] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2865.032626][T18792] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2865.039596][T18792] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2865.065529][T18792] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2865.088423][T18792] device hsr_slave_0 entered promiscuous mode [ 2865.094892][T18792] device hsr_slave_1 entered promiscuous mode [ 2865.101323][T18792] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2865.108977][T18792] Cannot create hsr debugfs directory [ 2865.147890][T18792] bridge0: port 2(bridge_slave_1) entered blocking state [ 2865.155010][T18792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2865.162317][T18792] bridge0: port 1(bridge_slave_0) entered blocking state [ 2865.169438][T18792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2865.202733][T18792] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2865.213391][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2865.223221][T16602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2865.231316][T16602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2865.244213][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2865.255518][T18792] 8021q: adding VLAN 0 to HW filter on device team0 [ 2865.267091][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2865.275517][ T4533] bridge0: port 1(bridge_slave_0) entered blocking state [ 2865.282559][ T4533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2865.294741][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2865.303364][T28225] bridge0: port 2(bridge_slave_1) entered blocking state [ 2865.310452][T28225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2865.328625][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2865.337473][T28225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2865.350310][T18792] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2865.360670][T18792] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2865.373227][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2865.381338][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2865.390047][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2865.404982][T18792] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2865.414045][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2865.421687][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2865.429440][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2865.485132][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2865.543591][T18792] device veth0_vlan entered promiscuous mode [ 2865.550882][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2865.559830][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2865.568681][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2865.578845][T18792] device veth1_vlan entered promiscuous mode [ 2865.588795][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2865.597145][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2865.610786][T18792] device veth0_macvtap entered promiscuous mode [ 2865.618824][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2865.627510][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2865.636645][T18792] device veth1_macvtap entered promiscuous mode [ 2865.648722][T18792] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2865.656879][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2865.668173][T18792] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2865.678822][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2865.742558][T18820] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2865.764454][T18820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2865.772854][T18820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2865.791793][T18820] device bridge_slave_0 left promiscuous mode [ 2865.798830][T18820] bridge0: port 1(bridge_slave_0) entered disabled state [ 2865.813964][T18820] device bridge_slave_1 left promiscuous mode [ 2865.820799][T18820] bridge0: port 2(bridge_slave_1) entered disabled state [ 2865.839216][T18820] bond0: (slave bond_slave_0): Releasing backup interface [ 2865.880497][T18820] bond0: (slave bond_slave_1): Releasing backup interface [ 2865.960651][T18820] team0: Port device team_slave_0 removed [ 2866.010936][T18820] team0: Port device team_slave_1 removed [ 2866.022855][T18820] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2866.031626][T18820] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2866.049162][T18820] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2866.057242][T18820] batman_adv: batadv0: Removing interface: batadv_slave_1 17:24:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5400000000000000, {r0}}, 0x58) 17:24:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000000f00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x300}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x4888, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5a00000000000000, {r0}}, 0x58) 17:24:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5a03000000000000, {r0}}, 0x58) [ 2866.212111][T18830] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2866.249767][T18830] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:24:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5c01000000000000, {r0}}, 0x58) [ 2866.259588][T18830] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000, {r0}}, 0x58) 17:24:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6001000000000000, {r0}}, 0x58) 17:24:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6002000000000000, {r0}}, 0x58) [ 2866.444348][T18827] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2866.485616][T18827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2866.496876][T18827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:50 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6103000000000000, {r0}}, 0x58) [ 2866.691062][T18828] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2866.724868][T18828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2866.737203][T18828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2866.858541][T18829] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2866.904408][T18834] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2866.941755][T18834] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2866.956344][T18834] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2867.070027][T18841] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2867.083025][T18841] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2867.097833][T18841] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2867.176551][T18849] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2867.205907][T18849] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2867.215402][T18849] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000001000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:51 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6400000000000000, {r0}}, 0x58) 17:24:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x500}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:51 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000, {r0}}, 0x58) [ 2867.417553][T18955] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:51 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6a00000000000000, {r0}}, 0x58) 17:24:51 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6a01000000000000, {r0}}, 0x58) [ 2867.460318][T18955] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2867.470081][T18955] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:51 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6a03000000000000, {r0}}, 0x58) 17:24:51 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000, {r0}}, 0x58) 17:24:51 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6c03000000000000, {r0}}, 0x58) [ 2867.694182][T18957] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2867.736642][T18957] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2867.745410][T18957] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2867.871986][T18959] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2867.937167][T18953] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2867.970878][T18953] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2867.979603][T18953] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2868.149999][T18961] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2868.192329][T18961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2868.201534][T18961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000001100000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:51 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6f03000000000000, {r0}}, 0x58) 17:24:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x5c4}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7200000000000000, {r0}}, 0x58) 17:24:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7201000000000000, {r0}}, 0x58) 17:24:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000, {r0}}, 0x58) [ 2868.385137][T19082] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7602000000000000, {r0}}, 0x58) [ 2868.433553][T19082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2868.448496][T19082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7603000000000000, {r0}}, 0x58) 17:24:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7700000000000000, {r0}}, 0x58) [ 2868.670663][T19083] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2868.715551][T19083] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2868.724168][T19083] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2868.888182][T19081] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2868.920481][T19081] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2868.930711][T19081] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2869.027515][T19087] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2869.102458][T19089] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2869.138563][T19089] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2869.147797][T19089] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000001200000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:52 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7803000000000000, {r0}}, 0x58) 17:24:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x88a8ffff, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x600}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000, {r0}}, 0x58) [ 2869.292812][T19206] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7a01000000000000, {r0}}, 0x58) [ 2869.335459][T19206] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2869.346452][T19206] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7a03000000000000, {r0}}, 0x58) 17:24:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7c00000000000000, {r0}}, 0x58) 17:24:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7c01000000000000, {r0}}, 0x58) 17:24:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, {r0}}, 0x58) [ 2869.535414][T19208] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2869.565751][T19208] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2869.575897][T19208] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2869.720848][T19210] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2869.757622][T19210] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2869.767774][T19210] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2869.891167][T19211] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2869.973604][T19213] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2870.005962][T19213] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2870.015574][T19213] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8401000000000000, {r0}}, 0x58) 17:24:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2870.119118][T19223] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2870.143279][T19223] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2870.154463][T19223] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x700}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x21000000, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:53 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8402000000000000, {r0}}, 0x58) 17:24:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8403000000000000, {r0}}, 0x58) [ 2870.287031][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8601000000000000, {r0}}, 0x58) [ 2870.332576][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2870.350201][T19331] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8602000000000000, {r0}}, 0x58) 17:24:54 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8803000000000000, {r0}}, 0x58) 17:24:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2870.477840][T19336] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2870.580615][T19337] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2870.613320][T19337] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2870.623134][T19337] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2870.793031][T19334] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2870.826354][T19334] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2870.834465][T19334] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2870.991175][T19339] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2871.023082][T19339] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2871.031718][T19339] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2871.135731][T19351] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2871.165291][T19351] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2871.173725][T19351] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000022000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8e00000000000000, {r0}}, 0x58) 17:24:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0x8, 0x17, [0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2871.280610][T19453] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2871.300352][T19453] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2871.310743][T19453] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x900}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8e03000000000000, {r0}}, 0x58) 17:24:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x7000000, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9003000000000000, {r0}}, 0x58) [ 2871.371556][T19459] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:24:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9202000000000000, {r0}}, 0x58) [ 2871.458866][T19456] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2871.491179][T19456] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:24:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9203000000000000, {r0}}, 0x58) [ 2871.502062][T19456] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9502000000000000, {r0}}, 0x58) 17:24:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9602000000000000, {r0}}, 0x58) [ 2871.635325][T19462] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2871.671365][T19462] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2871.691138][T19462] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2871.796782][T19465] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2871.829165][T19465] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2871.838342][T19465] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2872.009317][T19467] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2872.042264][T19467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2872.051229][T19467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000032000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9801000000000000, {r0}}, 0x58) 17:24:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x4000000, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2872.259127][T19578] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2872.270578][T19578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2872.278442][T19578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xa00}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe0, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xbc, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xe0}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:56 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9a02000000000000, {r0}}, 0x58) 17:24:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x4000000, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2872.302958][T19582] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:24:56 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9c03000000000000, {r0}}, 0x58) 17:24:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x4000000, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000002100000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:56 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9e03000000000000, {r0}}, 0x58) [ 2872.452119][T19590] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:56 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9f05000000000000, {r0}}, 0x58) [ 2872.495117][T19590] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2872.505732][T19590] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:56 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa002000000000000, {r0}}, 0x58) 17:24:56 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa200000000000000, {r0}}, 0x58) [ 2872.711299][T19588] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2872.737981][T19588] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2872.748051][T19588] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2872.930562][T19585] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2872.973856][T19585] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2872.992190][T19585] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2873.128209][T19694] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2873.158413][T19703] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:56 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa203000000000000, {r0}}, 0x58) 17:24:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xc00}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}]}]}, 0xe8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2873.189462][T19703] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2873.222295][T19703] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:57 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa403000000000000, {r0}}, 0x58) 17:24:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000002500000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) [ 2873.385813][T19759] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2873.420467][T19759] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2873.429553][T19759] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2873.603831][T19810] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2873.633080][T19810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2873.643355][T19810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2873.752146][T19814] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2873.792412][T19816] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2873.809677][T19816] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2873.817848][T19816] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2874.128121][T14432] device hsr_slave_0 left promiscuous mode [ 2874.134326][T14432] device hsr_slave_1 left promiscuous mode [ 2874.144463][T14432] device veth1_macvtap left promiscuous mode [ 2874.150488][T14432] device veth0_macvtap left promiscuous mode [ 2874.156529][T14432] device veth1_vlan left promiscuous mode [ 2874.162270][T14432] device veth0_vlan left promiscuous mode [ 2874.289635][T14432] bond0 (unregistering): Released all slaves [ 2874.469835][T19918] chnl_net:caif_netlink_parms(): no params data found [ 2874.507729][T19918] bridge0: port 1(bridge_slave_0) entered blocking state [ 2874.514874][T19918] bridge0: port 1(bridge_slave_0) entered disabled state [ 2874.523686][T19918] device bridge_slave_0 entered promiscuous mode [ 2874.531022][T19918] bridge0: port 2(bridge_slave_1) entered blocking state [ 2874.538138][T19918] bridge0: port 2(bridge_slave_1) entered disabled state [ 2874.547136][T19918] device bridge_slave_1 entered promiscuous mode [ 2874.563854][T19918] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2874.575502][T19918] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2874.594540][T19918] team0: Port device team_slave_0 added [ 2874.601324][T19918] team0: Port device team_slave_1 added [ 2874.627072][T19918] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2874.634047][T19918] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2874.660026][T19918] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2874.715508][T19918] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2874.722562][T19918] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2874.748469][T19918] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2874.772826][T19918] device hsr_slave_0 entered promiscuous mode [ 2874.779444][T19918] device hsr_slave_1 entered promiscuous mode [ 2874.785810][T19918] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2874.793397][T19918] Cannot create hsr debugfs directory [ 2874.855293][T19918] bridge0: port 2(bridge_slave_1) entered blocking state [ 2874.862414][T19918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2874.869719][T19918] bridge0: port 1(bridge_slave_0) entered blocking state [ 2874.876790][T19918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2874.905208][T19918] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2874.916962][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2874.925162][ T4533] bridge0: port 1(bridge_slave_0) entered disabled state [ 2874.934809][ T4533] bridge0: port 2(bridge_slave_1) entered disabled state [ 2874.946976][T19918] 8021q: adding VLAN 0 to HW filter on device team0 [ 2874.957607][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2874.965811][ T4533] bridge0: port 1(bridge_slave_0) entered blocking state [ 2874.972861][ T4533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2874.996482][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2875.004743][ T4467] bridge0: port 2(bridge_slave_1) entered blocking state [ 2875.011788][ T4467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2875.028865][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2875.038045][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2875.046429][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2875.056201][T19918] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2875.067617][T19918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2875.076174][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2875.084204][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2875.098392][T19918] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2875.105862][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2875.113442][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2875.172317][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2875.235139][T19918] device veth0_vlan entered promiscuous mode [ 2875.242476][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2875.251377][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2875.260346][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2875.273137][T19918] device veth1_vlan entered promiscuous mode [ 2875.280816][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2875.295526][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2875.304387][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2875.315330][T19918] device veth0_macvtap entered promiscuous mode [ 2875.329490][T19918] device veth1_macvtap entered promiscuous mode [ 2875.342409][T19918] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2875.350044][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2875.361537][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2875.373002][T19918] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2875.383918][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2875.392440][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2875.461606][T19946] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2875.482420][T19946] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2875.491082][T19946] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2875.507811][T19946] device bridge_slave_0 left promiscuous mode [ 2875.514420][T19946] bridge0: port 1(bridge_slave_0) entered disabled state [ 2875.528349][T19946] device bridge_slave_1 left promiscuous mode [ 2875.535000][T19946] bridge0: port 2(bridge_slave_1) entered disabled state [ 2875.552752][T19946] bond0: (slave bond_slave_0): Releasing backup interface [ 2875.587832][T19946] bond0: (slave bond_slave_1): Releasing backup interface [ 2875.661303][T19946] team0: Port device team_slave_0 removed [ 2875.709584][T19946] team0: Port device team_slave_1 removed [ 2875.720106][T19946] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2875.728096][T19946] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2875.741852][T19946] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2875.750034][T19946] batman_adv: batadv0: Removing interface: batadv_slave_1 17:24:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa7ffffff00000000, {r0}}, 0x58) 17:24:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xe8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}]}]}, 0xe8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xf00}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000022e00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:24:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:24:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xaa02000000000000, {r0}}, 0x58) 17:24:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xaf01000000000000, {r0}}, 0x58) [ 2875.947967][T19955] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:24:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb000000000000000, {r0}}, 0x58) [ 2876.013735][T19955] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2876.037352][T19955] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:24:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb001000000000000, {r0}}, 0x58) 17:24:59 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb102000000000000, {r0}}, 0x58) 17:25:00 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb400000000000000, {r0}}, 0x58) [ 2876.283698][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:25:00 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb401000000000000, {r0}}, 0x58) [ 2876.332511][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2876.350656][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2876.524181][T19953] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2876.606014][T19956] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2876.642863][T19956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2876.652826][T19956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2876.734923][T14432] device hsr_slave_0 left promiscuous mode [ 2876.743282][T14432] device hsr_slave_1 left promiscuous mode [ 2876.762869][T14432] device veth1_macvtap left promiscuous mode [ 2876.768890][T14432] device veth0_macvtap left promiscuous mode [ 2876.774885][T14432] device veth1_vlan left promiscuous mode [ 2876.780704][T14432] device veth0_vlan left promiscuous mode [ 2876.919914][T14432] bond0 (unregistering): Released all slaves [ 2876.984874][T19965] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2876.997113][T19965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2877.004508][T19965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2877.921277][T20073] chnl_net:caif_netlink_parms(): no params data found [ 2877.963376][T20073] bridge0: port 1(bridge_slave_0) entered blocking state [ 2877.970612][T20073] bridge0: port 1(bridge_slave_0) entered disabled state [ 2877.979551][T20073] device bridge_slave_0 entered promiscuous mode [ 2877.986896][T20073] bridge0: port 2(bridge_slave_1) entered blocking state [ 2877.994314][T20073] bridge0: port 2(bridge_slave_1) entered disabled state [ 2878.003711][T20073] device bridge_slave_1 entered promiscuous mode [ 2878.025285][T20073] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2878.037350][T20073] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2878.060763][T20073] team0: Port device team_slave_0 added [ 2878.067495][T20073] team0: Port device team_slave_1 added [ 2878.087522][T20073] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2878.094541][T20073] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2878.120809][T20073] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2878.134862][T20073] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2878.141868][T20073] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2878.167933][T20073] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2878.202689][T20073] device hsr_slave_0 entered promiscuous mode [ 2878.209499][T20073] device hsr_slave_1 entered promiscuous mode [ 2878.216003][T20073] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2878.223709][T20073] Cannot create hsr debugfs directory [ 2878.239367][T14432] device hsr_slave_0 left promiscuous mode [ 2878.248166][T14432] device hsr_slave_1 left promiscuous mode [ 2878.257135][T14432] device veth1_macvtap left promiscuous mode [ 2878.263173][T14432] device veth0_macvtap left promiscuous mode [ 2878.269212][T14432] device veth1_vlan left promiscuous mode [ 2878.275268][T14432] device veth0_vlan left promiscuous mode [ 2878.399232][T14432] bond0 (unregistering): Released all slaves [ 2878.479108][T20073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2878.490707][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2878.500237][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2878.509459][T20073] 8021q: adding VLAN 0 to HW filter on device team0 [ 2878.521775][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2878.530438][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2878.539589][ T1924] bridge0: port 1(bridge_slave_0) entered blocking state [ 2878.546637][ T1924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2878.563524][T20073] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2878.573957][T20073] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2878.586307][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2878.594118][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2878.602819][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2878.611218][ T7250] bridge0: port 2(bridge_slave_1) entered blocking state [ 2878.618255][ T7250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2878.626554][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2878.635441][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2878.644256][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2878.652787][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2878.661494][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2878.669995][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2878.678577][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2878.687047][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2878.700255][T20073] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2878.709857][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2878.718308][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2878.733850][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2878.741588][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2878.788651][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2878.920682][T20073] device veth0_vlan entered promiscuous mode [ 2878.938390][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2878.956212][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2878.963871][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2878.988811][T20073] device veth1_vlan entered promiscuous mode [ 2878.996719][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2879.005075][ T4467] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2879.019327][T20073] device veth0_macvtap entered promiscuous mode [ 2879.028756][T20073] device veth1_macvtap entered promiscuous mode [ 2879.037387][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2879.045909][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2879.060340][T20073] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2879.068496][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2879.087165][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2879.097953][T20073] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2879.123013][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2879.131719][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2879.201395][T20102] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2879.227640][T20102] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2879.237742][T20102] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2879.258002][T20102] device bridge_slave_0 left promiscuous mode [ 2879.264715][T20102] bridge0: port 1(bridge_slave_0) entered disabled state [ 2879.282242][T20102] device bridge_slave_1 left promiscuous mode [ 2879.289189][T20102] bridge0: port 2(bridge_slave_1) entered disabled state [ 2879.310579][T20102] bond0: (slave bond_slave_0): Releasing backup interface [ 2879.348048][T20102] bond0: (slave bond_slave_1): Releasing backup interface [ 2879.424791][T20102] team0: Port device team_slave_0 removed [ 2879.474124][T20102] team0: Port device team_slave_1 removed [ 2879.484536][T20102] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2879.492247][T20102] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2879.506277][T20102] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2879.514039][T20102] batman_adv: batadv0: Removing interface: batadv_slave_1 17:25:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0x24, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}]}, 0x24}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb601000000000000, {r0}}, 0x58) 17:25:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x2100}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000002f00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xbc00000000000000, {r0}}, 0x58) [ 2879.693785][T20105] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:25:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xbc03000000000000, {r0}}, 0x58) 17:25:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xbd00000000000000, {r0}}, 0x58) [ 2879.752788][T20105] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2879.767781][T20105] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc001000000000000, {r0}}, 0x58) 17:25:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff00000000, {r0}}, 0x58) 17:25:03 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc401000000000000, {r0}}, 0x58) [ 2880.116221][T20108] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2880.167833][T20108] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2880.189436][T20108] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2880.344098][T20110] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:25:04 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc402000000000000, {r0}}, 0x58) 17:25:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0x24, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}]}, 0x24}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2880.537670][T20228] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2880.566795][T20228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2880.575189][T20228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2881.089145][T14432] device hsr_slave_0 left promiscuous mode [ 2881.095394][T14432] device hsr_slave_1 left promiscuous mode [ 2881.103958][T14432] device veth1_macvtap left promiscuous mode [ 2881.109970][T14432] device veth0_macvtap left promiscuous mode [ 2881.115952][T14432] device veth1_vlan left promiscuous mode [ 2881.121737][T14432] device veth0_vlan left promiscuous mode [ 2881.241848][T14432] bond0 (unregistering): Released all slaves [ 2881.614381][T20232] chnl_net:caif_netlink_parms(): no params data found [ 2881.707681][T20232] bridge0: port 1(bridge_slave_0) entered blocking state [ 2881.714785][T20232] bridge0: port 1(bridge_slave_0) entered disabled state [ 2881.736672][T20232] device bridge_slave_0 entered promiscuous mode [ 2881.743944][T20232] bridge0: port 2(bridge_slave_1) entered blocking state [ 2881.751062][T20232] bridge0: port 2(bridge_slave_1) entered disabled state [ 2881.759665][T20232] device bridge_slave_1 entered promiscuous mode [ 2881.776837][T20232] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2881.787390][T20232] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2881.806636][T20232] team0: Port device team_slave_0 added [ 2881.813218][T20232] team0: Port device team_slave_1 added [ 2881.836822][T20232] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2881.843911][T20232] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2881.869869][T20232] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2881.881227][T20232] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2881.888192][T20232] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2881.914403][T20232] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2881.943063][T20232] device hsr_slave_0 entered promiscuous mode [ 2881.949840][T20232] device hsr_slave_1 entered promiscuous mode [ 2881.956956][T20232] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2881.964497][T20232] Cannot create hsr debugfs directory [ 2882.020372][T20232] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2882.031534][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2882.042158][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2882.049888][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2882.058869][T20232] 8021q: adding VLAN 0 to HW filter on device team0 [ 2882.069392][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2882.078232][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2882.087557][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2882.094599][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2882.112609][T20232] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2882.122966][T20232] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2882.136361][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2882.145795][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2882.155646][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2882.164000][T11867] bridge0: port 2(bridge_slave_1) entered blocking state [ 2882.171039][T11867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2882.180068][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2882.188971][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2882.197696][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2882.206061][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2882.220278][T20232] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2882.229782][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2882.237654][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2882.245434][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2882.253240][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2882.302738][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2882.360796][T20232] device veth0_vlan entered promiscuous mode [ 2882.369282][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2882.378211][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2882.385900][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2882.397155][T20232] device veth1_vlan entered promiscuous mode [ 2882.407288][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2882.415495][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2882.427913][T20232] device veth0_macvtap entered promiscuous mode [ 2882.435310][T20232] device veth1_macvtap entered promiscuous mode [ 2882.445113][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2882.453781][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2882.468378][T20232] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2882.476292][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2882.487768][T20232] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2882.498547][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2882.562996][T20260] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2882.585206][T20260] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2882.595312][T20260] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2882.614133][T20260] device bridge_slave_0 left promiscuous mode [ 2882.620993][T20260] bridge0: port 1(bridge_slave_0) entered disabled state [ 2882.636780][T20260] device bridge_slave_1 left promiscuous mode [ 2882.643486][T20260] bridge0: port 2(bridge_slave_1) entered disabled state [ 2882.663306][T20260] bond0: (slave bond_slave_0): Releasing backup interface [ 2882.704704][T20260] bond0: (slave bond_slave_1): Releasing backup interface [ 2882.780379][T20260] team0: Port device team_slave_0 removed [ 2882.829735][T20260] team0: Port device team_slave_1 removed [ 2882.840392][T20260] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2882.848372][T20260] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2882.862518][T20260] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2882.870680][T20260] batman_adv: batadv0: Removing interface: batadv_slave_1 17:25:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4788}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000003a00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc405000000000000, {r0}}, 0x58) 17:25:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0x24, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}]}, 0x24}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc502000000000000, {r0}}, 0x58) [ 2882.962614][T20264] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:25:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc505000000000000, {r0}}, 0x58) [ 2883.061657][T20268] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2883.112073][T20268] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2883.134629][T20268] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc601000000000000, {r0}}, 0x58) 17:25:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc603000000000000, {r0}}, 0x58) 17:25:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc800000000000000, {r0}}, 0x58) 17:25:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2883.399077][T20266] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2883.446387][T20266] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2883.464877][T20266] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2883.763854][T20280] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2883.798791][T20280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2883.807569][T20280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2883.949614][T20281] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2883.960948][T20281] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2883.969051][T20281] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xc801000000000000, {r0}}, 0x58) [ 2883.999860][T20264] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:25:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000003f00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2884.123069][T20286] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2884.152850][T20286] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2884.161372][T20286] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2884.267480][T20287] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2884.834696][T14432] device hsr_slave_0 left promiscuous mode [ 2884.846755][T14432] device hsr_slave_1 left promiscuous mode [ 2884.867655][T14432] device veth1_macvtap left promiscuous mode [ 2884.873653][T14432] device veth0_macvtap left promiscuous mode [ 2884.879708][T14432] device veth1_vlan left promiscuous mode [ 2884.885455][T14432] device veth0_vlan left promiscuous mode [ 2885.019752][T14432] bond0 (unregistering): Released all slaves [ 2885.148548][T20389] chnl_net:caif_netlink_parms(): no params data found [ 2885.185280][T20389] bridge0: port 1(bridge_slave_0) entered blocking state [ 2885.192336][T20389] bridge0: port 1(bridge_slave_0) entered disabled state [ 2885.201111][T20389] device bridge_slave_0 entered promiscuous mode [ 2885.208648][T20389] bridge0: port 2(bridge_slave_1) entered blocking state [ 2885.215670][T20389] bridge0: port 2(bridge_slave_1) entered disabled state [ 2885.224441][T20389] device bridge_slave_1 entered promiscuous mode [ 2885.242636][T20389] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2885.254527][T20389] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2885.288431][T20389] team0: Port device team_slave_0 added [ 2885.307015][T20389] team0: Port device team_slave_1 added [ 2885.337753][T20389] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2885.344730][T20389] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2885.370847][T20389] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2885.427619][T20389] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2885.434574][T20389] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2885.460533][T20389] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2885.542753][T20389] device hsr_slave_0 entered promiscuous mode [ 2885.556968][T20389] device hsr_slave_1 entered promiscuous mode [ 2885.566419][T20389] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2885.573956][T20389] Cannot create hsr debugfs directory [ 2885.620608][T20389] bridge0: port 2(bridge_slave_1) entered blocking state [ 2885.627796][T20389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2885.635034][T20389] bridge0: port 1(bridge_slave_0) entered blocking state [ 2885.642089][T20389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2885.670465][T20389] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2885.681084][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2885.689554][T16602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2885.697695][T16602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2885.709826][T20389] 8021q: adding VLAN 0 to HW filter on device team0 [ 2885.719831][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2885.728340][T11867] bridge0: port 1(bridge_slave_0) entered blocking state [ 2885.735467][T11867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2885.753370][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2885.762025][T16602] bridge0: port 2(bridge_slave_1) entered blocking state [ 2885.769075][T16602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2885.778652][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2885.787419][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2885.799430][T20389] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2885.809978][T20389] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2885.822379][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2885.830487][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2885.838852][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2885.852511][T20389] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2885.861643][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2885.869581][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2885.883780][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2885.932646][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2885.993467][T20389] device veth0_vlan entered promiscuous mode [ 2886.001674][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2886.010487][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2886.019040][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2886.028947][T20389] device veth1_vlan entered promiscuous mode [ 2886.037231][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2886.045125][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2886.058696][T20389] device veth0_macvtap entered promiscuous mode [ 2886.066632][T20389] device veth1_macvtap entered promiscuous mode [ 2886.074779][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2886.083510][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2886.096088][T20389] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2886.104925][T20389] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2886.112253][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2886.120941][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2886.129864][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2886.138383][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2886.203971][T20417] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2886.224415][T20417] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2886.233474][T20417] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2886.251652][T20417] device bridge_slave_0 left promiscuous mode [ 2886.258503][T20417] bridge0: port 1(bridge_slave_0) entered disabled state [ 2886.272849][T20417] device bridge_slave_1 left promiscuous mode [ 2886.279819][T20417] bridge0: port 2(bridge_slave_1) entered disabled state [ 2886.297135][T20417] bond0: (slave bond_slave_0): Releasing backup interface [ 2886.331683][T20417] bond0: (slave bond_slave_1): Releasing backup interface [ 2886.410579][T20417] team0: Port device team_slave_0 removed [ 2886.461289][T20417] team0: Port device team_slave_1 removed [ 2886.473096][T20417] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2886.481277][T20417] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2886.496276][T20417] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2886.504106][T20417] batman_adv: batadv0: Removing interface: batadv_slave_1 17:25:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4888}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xca03000000000000, {r0}}, 0x58) 17:25:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c000000100001040000003b3f00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xcb01000000000000, {r0}}, 0x58) 17:25:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xcc02000000000000, {r0}}, 0x58) [ 2886.682098][T20421] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:25:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xcc03000000000000, {r0}}, 0x58) [ 2886.740438][T20421] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2886.765345][T20421] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xcd03000000000000, {r0}}, 0x58) 17:25:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xce02000000000000, {r0}}, 0x58) 17:25:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xce03000000000000, {r0}}, 0x58) [ 2886.966748][T20425] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2887.052543][T20424] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2887.104752][T20424] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2887.126804][T20424] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x5865}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd000000000000000, {r0}}, 0x58) [ 2887.400279][T20437] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2887.412835][T20437] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2887.420744][T20437] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2887.541729][T20543] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2887.571589][T20543] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2887.580433][T20543] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2888.048568][T14424] device hsr_slave_0 left promiscuous mode [ 2888.054891][T14424] device hsr_slave_1 left promiscuous mode [ 2888.065336][T14424] device veth1_macvtap left promiscuous mode [ 2888.071566][T14424] device veth0_macvtap left promiscuous mode [ 2888.077591][T14424] device veth1_vlan left promiscuous mode [ 2888.083424][T14424] device veth0_vlan left promiscuous mode [ 2888.201657][T14424] bond0 (unregistering): Released all slaves [ 2888.536571][T20547] chnl_net:caif_netlink_parms(): no params data found [ 2888.587548][T20547] bridge0: port 1(bridge_slave_0) entered blocking state [ 2888.594676][T20547] bridge0: port 1(bridge_slave_0) entered disabled state [ 2888.617736][T20547] device bridge_slave_0 entered promiscuous mode [ 2888.626638][T20547] bridge0: port 2(bridge_slave_1) entered blocking state [ 2888.633744][T20547] bridge0: port 2(bridge_slave_1) entered disabled state [ 2888.657613][T20547] device bridge_slave_1 entered promiscuous mode [ 2888.699924][T20547] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2888.717618][T20547] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2888.757020][T20547] team0: Port device team_slave_0 added [ 2888.777670][T20547] team0: Port device team_slave_1 added [ 2888.803807][T20547] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2888.810833][T20547] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2888.836754][T20547] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2888.856648][T20547] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2888.863664][T20547] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2888.889617][T20547] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2888.930233][T20547] device hsr_slave_0 entered promiscuous mode [ 2888.942715][T20547] device hsr_slave_1 entered promiscuous mode [ 2888.949243][T20547] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2888.956828][T20547] Cannot create hsr debugfs directory [ 2889.001787][T20547] bridge0: port 2(bridge_slave_1) entered blocking state [ 2889.008843][T20547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2889.016158][T20547] bridge0: port 1(bridge_slave_0) entered blocking state [ 2889.023200][T20547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2889.050109][T20547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2889.060647][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2889.069028][T16602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2889.077050][T16602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2889.097819][T20547] 8021q: adding VLAN 0 to HW filter on device team0 [ 2889.107645][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2889.116016][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2889.123051][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2889.142356][T20547] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2889.152734][T20547] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2889.166689][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2889.174918][T11867] bridge0: port 2(bridge_slave_1) entered blocking state [ 2889.181967][T11867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2889.190916][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2889.199645][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2889.208285][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2889.216558][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2889.231095][T20547] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2889.239936][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2889.248650][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2889.256056][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2889.263900][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2889.313886][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2889.373890][T20547] device veth0_vlan entered promiscuous mode [ 2889.380936][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2889.391158][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2889.399072][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2889.410378][T20547] device veth1_vlan entered promiscuous mode [ 2889.417356][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2889.431527][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2889.440130][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2889.449558][T20547] device veth0_macvtap entered promiscuous mode [ 2889.458279][T20547] device veth1_macvtap entered promiscuous mode [ 2889.466817][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2889.479785][T20547] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2889.487469][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2889.496062][ T4533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2889.506439][T20547] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2889.517227][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2889.525775][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2889.587375][T20576] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2889.607891][T20576] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2889.616693][T20576] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2889.634106][T20576] device bridge_slave_0 left promiscuous mode [ 2889.641012][T20576] bridge0: port 1(bridge_slave_0) entered disabled state [ 2889.655637][T20576] device bridge_slave_1 left promiscuous mode [ 2889.662478][T20576] bridge0: port 2(bridge_slave_1) entered disabled state [ 2889.680238][T20576] bond0: (slave bond_slave_0): Releasing backup interface [ 2889.715041][T20576] bond0: (slave bond_slave_1): Releasing backup interface [ 2889.787005][T20576] team0: Port device team_slave_0 removed [ 2889.835595][T20576] team0: Port device team_slave_1 removed [ 2889.847188][T20576] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2889.854977][T20576] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2889.869076][T20576] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2889.876895][T20576] batman_adv: batadv0: Removing interface: batadv_slave_1 17:25:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x4788, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000004000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6000}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd002000000000000, {r0}}, 0x58) 17:25:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd003000000000000, {r0}}, 0x58) [ 2889.981035][T20580] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:25:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd102000000000000, {r0}}, 0x58) 17:25:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd200000000000000, {r0}}, 0x58) 17:25:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd202000000000000, {r0}}, 0x58) [ 2890.153887][T20579] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:25:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd400000000000000, {r0}}, 0x58) [ 2890.202985][T20579] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2890.227100][T20579] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd401000000000000, {r0}}, 0x58) [ 2890.521887][T20584] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2890.565314][T20584] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2890.583960][T20584] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2890.775636][T20586] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2890.800305][T20586] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2890.808991][T20586] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x4788, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd403000000000000, {r0}}, 0x58) 17:25:14 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000004400000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) [ 2890.900253][T20706] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2890.940791][T20705] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2890.968656][T20705] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2890.980430][T20705] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2891.072093][T20706] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2891.960777][T20709] chnl_net:caif_netlink_parms(): no params data found [ 2891.998365][T20709] bridge0: port 1(bridge_slave_0) entered blocking state [ 2892.005406][T20709] bridge0: port 1(bridge_slave_0) entered disabled state [ 2892.013203][T20709] device bridge_slave_0 entered promiscuous mode [ 2892.021573][T20709] bridge0: port 2(bridge_slave_1) entered blocking state [ 2892.028667][T20709] bridge0: port 2(bridge_slave_1) entered disabled state [ 2892.038867][T20709] device bridge_slave_1 entered promiscuous mode [ 2892.056195][T20709] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2892.066386][T20709] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2892.085249][T20709] team0: Port device team_slave_0 added [ 2892.091689][T20709] team0: Port device team_slave_1 added [ 2892.106772][T20709] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2892.113735][T20709] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2892.139823][T20709] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2892.151128][T20709] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2892.158110][T20709] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2892.184063][T20709] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2892.207329][T20709] device hsr_slave_0 entered promiscuous mode [ 2892.213979][T20709] device hsr_slave_1 entered promiscuous mode [ 2892.220437][T20709] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2892.228032][T20709] Cannot create hsr debugfs directory [ 2892.264478][T20709] bridge0: port 2(bridge_slave_1) entered blocking state [ 2892.271638][T20709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2892.279054][T20709] bridge0: port 1(bridge_slave_0) entered blocking state [ 2892.286067][T20709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2892.319114][T20709] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2892.329732][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2892.339669][T17120] bridge0: port 1(bridge_slave_0) entered disabled state [ 2892.347695][T17120] bridge0: port 2(bridge_slave_1) entered disabled state [ 2892.360722][T20709] 8021q: adding VLAN 0 to HW filter on device team0 [ 2892.370890][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2892.380625][ T7250] bridge0: port 1(bridge_slave_0) entered blocking state [ 2892.387657][ T7250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2892.410494][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2892.419501][T17120] bridge0: port 2(bridge_slave_1) entered blocking state [ 2892.426560][T17120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2892.437034][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2892.445934][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2892.456012][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2892.464145][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2892.474326][T20709] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2892.482888][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2892.497507][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2892.504933][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2892.515080][T20709] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2892.569820][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2892.628173][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2892.638245][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2892.646060][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2892.654944][T20709] device veth0_vlan entered promiscuous mode [ 2892.665668][T20709] device veth1_vlan entered promiscuous mode [ 2892.681125][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2892.689597][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2892.699395][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2892.709044][T20709] device veth0_macvtap entered promiscuous mode [ 2892.717407][T20709] device veth1_macvtap entered promiscuous mode [ 2892.729990][T20709] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2892.737443][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2892.747443][T17120] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2892.757583][T20709] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2892.767760][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2892.838076][T20737] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2892.866283][T20737] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2892.874817][T20737] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2892.897234][T20737] device bridge_slave_0 left promiscuous mode [ 2892.904127][T20737] bridge0: port 1(bridge_slave_0) entered disabled state [ 2892.921123][T20737] device bridge_slave_1 left promiscuous mode [ 2892.928028][T20737] bridge0: port 2(bridge_slave_1) entered disabled state [ 2892.947755][T20737] bond0: (slave bond_slave_0): Releasing backup interface [ 2892.990290][T20737] bond0: (slave bond_slave_1): Releasing backup interface [ 2893.073094][T20737] team0: Port device team_slave_0 removed [ 2893.125136][T20737] team0: Port device team_slave_1 removed [ 2893.137754][T20737] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2893.145779][T20737] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2893.162597][T20737] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2893.170532][T20737] batman_adv: batadv0: Removing interface: batadv_slave_1 17:25:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0xf, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6558}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd601000000000000, {r0}}, 0x58) 17:25:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0xc00, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000004800000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd802000000000000, {r0}}, 0x58) 17:25:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2893.272111][T20746] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:25:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xd803000000000000, {r0}}, 0x58) 17:25:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xda00000000000000, {r0}}, 0x58) 17:25:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xda03000000000000, {r0}}, 0x58) [ 2893.377986][T20747] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2893.449591][T20747] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2893.458859][T20747] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2893.642811][T20744] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2893.673554][T20744] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2893.682197][T20744] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2893.830980][T20750] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2893.872515][T20750] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2893.882695][T20750] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 17:25:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xdaffffff00000000, {r0}}, 0x58) 17:25:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8100}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x9, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2893.989711][T20746] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:25:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000004a00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xde02000000000000, {r0}}, 0x58) 17:25:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 17:25:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe0ffffff00000000, {r0}}, 0x58) [ 2894.103933][T20768] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2894.137439][T20768] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2894.146859][T20768] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 17:25:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe203000000000000, {r0}}, 0x58) 17:25:17 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe401000000000000, {r0}}, 0x58) [ 2894.299634][T20767] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2894.328109][T20767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2894.341037][T20767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2894.452210][T20774] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2894.504802][T20772] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2894.538884][T20772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2894.548563][T20772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 17:25:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe402000000000000, {r0}}, 0x58) 17:25:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8847}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000004c00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe403000000000000, {r0}}, 0x58) 17:25:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 17:25:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe600000000000000, {r0}}, 0x58) 17:25:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe801000000000000, {r0}}, 0x58) [ 2894.783598][T20878] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:25:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 17:25:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000, {r0}}, 0x58) [ 2894.838090][T20878] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2894.857074][T20878] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2895.032342][T20895] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2895.068915][T20895] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2895.079295][T20895] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 17:25:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe901000000000000, {r0}}, 0x58) 17:25:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8848}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2895.241147][T20897] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2895.374301][T20914] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2895.408580][T20914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2895.417239][T20914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000035c00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xea02000000000000, {r0}}, 0x58) 17:25:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 17:25:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:19 executing program 0: statx(0xffffffffffffffff, &(0x7f00000012c0)='./file0\x00', 0x4000, 0x7ff, &(0x7f0000001300)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x2208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$sg(0x0, 0x0, 0x0) getegid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000007280)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982678dc1fdee74e7013db4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb012c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008162d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573d99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea138afdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6ffffff7f04e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a82d0df98674152f94e32409e2a3bce109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288d139bd3da20fed05a8fe644a0b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af932cd6db49a47613808bad959719c0000000000378a921c7f7f6933c2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6605eb7a00e127cc3b95b4fb40c2651838572d8c7d6683046dba81558c8c6c7fd9f3bb4fe53f52814b1d0d663edfdea7e31d42554e252be6b61435710b5c8db749180a9a0e605f252b6582623d2ad5e6db00e7770a82d5145ed943bbc4c50188eddb3f0d4bb1352f20a5a764aeb3c3f0649f6e6270cb480e4c246f2fa585a593aab1f86deec510ad41e4dae0a421c3185c7b77348960c0278e7ae50d656f6b928e8ef00"/2658], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) syz_io_uring_setup(0x4778, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x372}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000140), &(0x7f00000002c0)) fsmount(0xffffffffffffffff, 0x1, 0x5) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000300), 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f00000018c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001ac0)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)}], 0x1, 0x0, 0xd0, 0x4000}}], 0x2, 0x0) clone3(&(0x7f0000000000)={0x16c105700, &(0x7f0000000100), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 17:25:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xea03000000000000, {r0}}, 0x58) 17:25:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 17:25:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xec01000000000000, {r0}}, 0x58) 17:25:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2895.718920][T20917] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:25:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xec03000000000000, {r0}}, 0x58) [ 2895.827045][T20917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2895.845707][T20917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xc405}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2896.021506][T21023] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2896.204243][T21042] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2896.261669][T21042] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2896.282363][T21042] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000006000000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:20 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xee00000000000000, {r0}}, 0x58) 17:25:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2896.480087][T21076] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2896.490998][T21076] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2896.514528][T21076] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2896.566382][T21150] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2897.048704][T14432] device hsr_slave_0 left promiscuous mode [ 2897.059324][T14432] device hsr_slave_1 left promiscuous mode [ 2897.076548][T14432] device veth1_macvtap left promiscuous mode [ 2897.082554][T14432] device veth0_macvtap left promiscuous mode [ 2897.088572][T14432] device veth1_vlan left promiscuous mode [ 2897.094294][T14432] device veth0_vlan left promiscuous mode [ 2897.265579][T14432] bond0 (unregistering): Released all slaves [ 2897.649958][T21252] chnl_net:caif_netlink_parms(): no params data found [ 2897.716640][T21252] bridge0: port 1(bridge_slave_0) entered blocking state [ 2897.723756][T21252] bridge0: port 1(bridge_slave_0) entered disabled state [ 2897.731599][T21252] device bridge_slave_0 entered promiscuous mode [ 2897.739463][T21252] bridge0: port 2(bridge_slave_1) entered blocking state [ 2897.746509][T21252] bridge0: port 2(bridge_slave_1) entered disabled state [ 2897.754083][T21252] device bridge_slave_1 entered promiscuous mode [ 2897.778208][T21252] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2897.807133][T21252] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2897.825628][T21252] team0: Port device team_slave_0 added [ 2897.832372][T21252] team0: Port device team_slave_1 added [ 2897.848567][T21252] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2897.855577][T21252] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2897.881576][T21252] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2897.892948][T21252] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2897.899912][T21252] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2897.926000][T21252] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2897.955280][T21252] device hsr_slave_0 entered promiscuous mode [ 2897.961823][T21252] device hsr_slave_1 entered promiscuous mode [ 2897.969723][T21252] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2897.977315][T21252] Cannot create hsr debugfs directory [ 2898.024763][T21252] bridge0: port 2(bridge_slave_1) entered blocking state [ 2898.031835][T21252] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2898.039348][T21252] bridge0: port 1(bridge_slave_0) entered blocking state [ 2898.046394][T21252] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2898.079878][T21252] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2898.090758][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2898.100892][T16602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2898.108856][T16602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2898.122930][T21252] 8021q: adding VLAN 0 to HW filter on device team0 [ 2898.133164][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2898.143044][T11867] bridge0: port 1(bridge_slave_0) entered blocking state [ 2898.150086][T11867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2898.167410][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2898.175809][T11867] bridge0: port 2(bridge_slave_1) entered blocking state [ 2898.182850][T11867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2898.192108][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2898.207303][T21252] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2898.217685][T21252] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2898.230689][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2898.238960][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2898.248104][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2898.256491][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2898.264999][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2898.282610][T21252] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2898.290339][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2898.297890][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2898.355252][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2898.364095][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2898.426016][T21252] device veth0_vlan entered promiscuous mode [ 2898.434024][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2898.442475][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2898.455084][T21252] device veth1_vlan entered promiscuous mode [ 2898.461800][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2898.469831][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2898.477601][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2898.492473][T21252] device veth0_macvtap entered promiscuous mode [ 2898.500302][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2898.509716][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2898.518323][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2898.529312][T21252] device veth1_macvtap entered promiscuous mode [ 2898.536299][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2898.544693][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2898.558420][T21252] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2898.568235][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2898.577161][T24949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2898.587896][T21252] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2898.600598][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2898.609341][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2898.629231][T21252] ================================================================== [ 2898.637331][T21252] BUG: KCSAN: data-race in dev_get_tstats64 / wg_packet_rx_poll [ 2898.644969][T21252] [ 2898.647282][T21252] write to 0xffffe8ffffc60748 of 8 bytes by interrupt on cpu 0: [ 2898.654906][T21252] wg_packet_rx_poll+0xf59/0x11f0 [ 2898.659935][T21252] __napi_poll+0x65/0x3f0 [ 2898.664264][T21252] net_rx_action+0x29e/0x650 [ 2898.668851][T21252] __do_softirq+0x158/0x2de [ 2898.673350][T21252] do_softirq+0xb1/0xf0 [ 2898.677505][T21252] __local_bh_enable_ip+0x68/0x70 [ 2898.682523][T21252] _raw_spin_unlock_bh+0x33/0x40 [ 2898.687458][T21252] wg_packet_decrypt_worker+0x73c/0x780 [ 2898.693001][T21252] process_one_work+0x3fc/0x980 [ 2898.698078][T21252] worker_thread+0x616/0xa70 [ 2898.702670][T21252] kthread+0x2c7/0x2e0 [ 2898.707076][T21252] ret_from_fork+0x1f/0x30 [ 2898.711485][T21252] [ 2898.713801][T21252] read to 0xffffe8ffffc60748 of 8 bytes by task 21252 on cpu 1: [ 2898.721435][T21252] dev_get_tstats64+0x126/0x1e0 [ 2898.726287][T21252] dev_get_stats+0x65/0x180 [ 2898.730791][T21252] rtnl_fill_stats+0x45/0x320 [ 2898.735460][T21252] rtnl_fill_ifinfo+0xebf/0x2560 [ 2898.740398][T21252] rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2898.745681][T21252] rtmsg_ifinfo+0x58/0xc0 [ 2898.750005][T21252] __dev_notify_flags+0x63/0x3b0 [ 2898.754966][T21252] dev_change_flags+0xa2/0xc0 [ 2898.759634][T21252] do_setlink+0x810/0x2410 [ 2898.764065][T21252] rtnl_newlink+0xfad/0x13b0 [ 2898.768647][T21252] rtnetlink_rcv_msg+0x745/0x7e0 [ 2898.773591][T21252] netlink_rcv_skb+0x14e/0x250 [ 2898.778532][T21252] rtnetlink_rcv+0x18/0x20 [ 2898.782966][T21252] netlink_unicast+0x5fc/0x6c0 [ 2898.787732][T21252] netlink_sendmsg+0x6e1/0x7d0 [ 2898.792506][T21252] __sys_sendto+0x21e/0x2c0 [ 2898.797006][T21252] __x64_sys_sendto+0x74/0x90 [ 2898.801685][T21252] do_syscall_64+0x44/0xd0 [ 2898.806123][T21252] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2898.812045][T21252] [ 2898.814363][T21252] value changed: 0x000000000000007c -> 0x000000000000009c [ 2898.821467][T21252] [ 2898.823783][T21252] Reported by Kernel Concurrency Sanitizer on: [ 2898.829920][T21252] CPU: 1 PID: 21252 Comm: syz-executor.1 Not tainted 5.16.0-rc2-syzkaller #0 [ 2898.838679][T21252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2898.848726][T21252] ================================================================== [ 2898.911033][T21280] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2898.933615][T21280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2898.942347][T21280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2898.960393][T21280] device bridge_slave_0 left promiscuous mode [ 2898.967044][T21280] bridge0: port 1(bridge_slave_0) entered disabled state [ 2898.981206][T21280] device bridge_slave_1 left promiscuous mode [ 2898.988047][T21280] bridge0: port 2(bridge_slave_1) entered disabled state [ 2899.008653][T21280] bond0: (slave bond_slave_0): Releasing backup interface [ 2899.045572][T21280] bond0: (slave bond_slave_1): Releasing backup interface [ 2899.124799][T21280] team0: Port device team_slave_0 removed [ 2899.176580][T21280] team0: Port device team_slave_1 removed [ 2899.189346][T21280] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2899.197320][T21280] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2899.214735][T21280] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2899.222662][T21280] batman_adv: batadv0: Removing interface: batadv_slave_1 17:25:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xee01000000000000, {r0}}, 0x58) 17:25:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 17:25:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000006400000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x8848}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xefffffff00000000, {r0}}, 0x58) 17:25:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf002000000000000, {r0}}, 0x58) [ 2899.390869][T21285] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2899.429884][T21285] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:25:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf003000000000000, {r0}}, 0x58) [ 2899.439129][T21285] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000, {r0}}, 0x58) 17:25:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf201000000000000, {r0}}, 0x58) 17:25:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf203000000000000, {r0}}, 0x58) [ 2899.573540][T21287] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2899.665106][T21286] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2899.700895][T21286] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2899.709862][T21286] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2899.869029][T21292] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2899.900145][T21292] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2899.909168][T21292] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf400000000000000, {r0}}, 0x58) 17:25:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 17:25:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000586500000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf403000000000000, {r0}}, 0x58) 17:25:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 17:25:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf601000000000000, {r0}}, 0x58) [ 2900.135543][T21412] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:25:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf603000000000000, {r0}}, 0x58) [ 2900.178245][T21412] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2900.195671][T21412] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:23 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf800000000000000, {r0}}, 0x58) 17:25:24 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf802000000000000, {r0}}, 0x58) 17:25:24 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf803000000000000, {r0}}, 0x58) 17:25:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) (fail_nth: 1) 17:25:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:26 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfa03000000000000, {r0}}, 0x58) [ 2902.886221][T21416] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2902.911287][T21252] syz-executor.1 (21252) used greatest stack depth: 9520 bytes left 17:25:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000006800000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:26 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000, {r0}}, 0x58) 17:25:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 17:25:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:26 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfc03000000000000, {r0}}, 0x58) [ 2903.045444][T21550] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:25:26 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfe00000000000000, {r0}}, 0x58) [ 2903.168692][T21549] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:25:26 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfe03000000000000, {r0}}, 0x58) [ 2903.243091][T21549] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2903.273048][T21549] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:25:27 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfe80ffff00000000, {r0}}, 0x58) 17:25:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:27 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfec0ffff00000000, {r0}}, 0x58) 17:25:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFT_MSG_GETSETELEM(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x30, 0xd, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xec, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xc8, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x68, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xec}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2903.652276][T21552] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2903.669523][T21552] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2903.707009][T21552] 8021q: adding VLAN 0 to HW filter on device team0 [ 2903.744870][T21552] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2903.767072][T21550] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2903.789707][T21563] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:25:27 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000006c00000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) [ 2903.819764][T21563] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2903.831648][T21552] syz-executor.2 (21552) used greatest stack depth: 9272 bytes left 17:25:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 17:25:27 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfeff000000000000, {r0}}, 0x58) 17:25:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2903.901478][T21565] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2904.041770][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2904.090876][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2904.113723][T21569] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2905.263026][T21675] chnl_net:caif_netlink_parms(): no params data found [ 2905.304551][T21675] bridge0: port 1(bridge_slave_0) entered blocking state [ 2905.311608][T21675] bridge0: port 1(bridge_slave_0) entered disabled state [ 2905.319518][T21675] device bridge_slave_0 entered promiscuous mode [ 2905.327096][T21675] bridge0: port 2(bridge_slave_1) entered blocking state [ 2905.334176][T21675] bridge0: port 2(bridge_slave_1) entered disabled state [ 2905.341908][T21675] device bridge_slave_1 entered promiscuous mode [ 2905.355254][T14432] device hsr_slave_0 left promiscuous mode [ 2905.363052][T14432] device hsr_slave_1 left promiscuous mode [ 2905.372038][T14432] device veth1_macvtap left promiscuous mode [ 2905.378158][T14432] device veth0_macvtap left promiscuous mode [ 2905.384137][T14432] device veth1_vlan left promiscuous mode [ 2905.390053][T14432] device veth0_vlan left promiscuous mode [ 2905.652138][T14432] bond0 (unregistering): Released all slaves [ 2905.704120][T21675] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2905.722307][T21675] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2905.741972][T21675] team0: Port device team_slave_0 added [ 2905.757228][T21675] team0: Port device team_slave_1 added [ 2905.781371][T21675] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2905.788399][T21675] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2905.814972][T21675] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2905.828073][T21675] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2905.835018][T21675] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2905.860972][T21675] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2905.901343][T21675] device hsr_slave_0 entered promiscuous mode [ 2905.909456][T21675] device hsr_slave_1 entered promiscuous mode [ 2905.915879][T21675] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2905.923469][T21675] Cannot create hsr debugfs directory [ 2905.977325][T21689] chnl_net:caif_netlink_parms(): no params data found [ 2906.042438][T21675] bridge0: port 2(bridge_slave_1) entered blocking state [ 2906.049506][T21675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2906.056941][T21675] bridge0: port 1(bridge_slave_0) entered blocking state [ 2906.063959][T21675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2906.132088][T21689] bridge0: port 1(bridge_slave_0) entered blocking state [ 2906.139196][T21689] bridge0: port 1(bridge_slave_0) entered disabled state [ 2906.147960][T21689] device bridge_slave_0 entered promiscuous mode [ 2906.155386][T21689] bridge0: port 2(bridge_slave_1) entered blocking state [ 2906.162425][T21689] bridge0: port 2(bridge_slave_1) entered disabled state [ 2906.170049][T21689] device bridge_slave_1 entered promiscuous mode [ 2906.189305][T21689] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2906.198743][T17120] bridge0: port 1(bridge_slave_0) entered disabled state [ 2906.207130][T17120] bridge0: port 2(bridge_slave_1) entered disabled state [ 2906.231649][T21675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2906.240143][T21689] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2906.270954][T21689] team0: Port device team_slave_0 added [ 2906.283249][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2906.296969][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2906.315765][T21675] 8021q: adding VLAN 0 to HW filter on device team0 [ 2906.323576][T21689] team0: Port device team_slave_1 added [ 2906.359970][T21675] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2906.370543][T21675] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2906.383680][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2906.392553][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2906.402905][T16602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2906.409953][T16602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2906.419132][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2906.427806][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2906.436314][T16602] bridge0: port 2(bridge_slave_1) entered blocking state [ 2906.443406][T16602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2906.453169][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2906.462010][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2906.472253][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2906.480770][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2906.491065][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2906.499735][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2906.510336][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2906.518739][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2906.528662][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2906.537214][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2906.560111][T21675] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2906.570466][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2906.578971][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2906.588709][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2906.596195][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2906.604023][T21689] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2906.611042][T21689] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2906.637418][T21689] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2906.650899][T21689] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2906.657880][T21689] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2906.683793][T21689] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2906.726588][T21689] device hsr_slave_0 entered promiscuous mode [ 2906.733079][T21689] device hsr_slave_1 entered promiscuous mode [ 2906.739882][T21689] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2906.748492][T21689] Cannot create hsr debugfs directory [ 2906.763722][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2906.772419][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2906.858200][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2906.866909][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2906.875662][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2906.884985][ T1924] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2906.893587][T21675] device veth0_vlan entered promiscuous mode [ 2906.916975][T21675] device veth1_vlan entered promiscuous mode [ 2906.925868][T21689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2906.943055][T21675] device veth0_macvtap entered promiscuous mode [ 2906.953481][T21689] 8021q: adding VLAN 0 to HW filter on device team0 [ 2906.962252][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2906.970569][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2906.978855][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2906.987273][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2906.995843][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2907.003734][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2907.016247][T21675] device veth1_macvtap entered promiscuous mode [ 2907.037615][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2907.045739][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2907.054060][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2907.062995][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2907.071578][T21539] bridge0: port 1(bridge_slave_0) entered blocking state [ 2907.078620][T21539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2907.086573][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2907.095104][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2907.103443][T21539] bridge0: port 2(bridge_slave_1) entered blocking state [ 2907.110520][T21539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2907.118368][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2907.127418][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2907.136208][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2907.144955][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2907.153568][T21539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2907.163949][T21689] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2907.175250][T21689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2907.184238][T21675] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2907.196076][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2907.204169][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2907.212127][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2907.220640][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2907.229282][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2907.243939][T21689] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2907.264769][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2907.272266][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2907.281282][T21675] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2907.292497][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2907.301482][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2907.328225][T14432] device hsr_slave_0 left promiscuous mode [ 2907.342045][T14432] device hsr_slave_1 left promiscuous mode [ 2907.350711][T14432] device veth1_macvtap left promiscuous mode [ 2907.356769][T14432] device veth0_macvtap left promiscuous mode [ 2907.362773][T14432] device veth1_vlan left promiscuous mode [ 2907.368542][T14432] device veth0_vlan left promiscuous mode [ 2907.503921][T14432] bond0 (unregistering): Released all slaves [ 2907.571623][T21722] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2907.594940][T21722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2907.604917][T21722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2907.621925][T21722] device bridge_slave_0 left promiscuous mode [ 2907.629071][T21722] bridge0: port 1(bridge_slave_0) entered disabled state [ 2907.649625][T21722] device bridge_slave_1 left promiscuous mode [ 2907.656426][T21722] bridge0: port 2(bridge_slave_1) entered disabled state [ 2907.675790][T21722] bond0: (slave bond_slave_0): Releasing backup interface [ 2907.713290][T21722] bond0: (slave bond_slave_1): Releasing backup interface [ 2907.791347][T21722] team0: Port device team_slave_0 removed [ 2907.839259][T21722] team0: Port device team_slave_1 removed [ 2907.851387][T21722] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2907.859159][T21722] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2907.874912][T21722] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2907.883002][T21722] batman_adv: batadv0: Removing interface: batadv_slave_1 17:25:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 17:25:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000, {r0}}, 0x58) 17:25:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'macvtap0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c00000010000104000000007400000000000000", @ANYRES32=0x0, @ANYBLOB="9f3a0000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c00010067000000c6da000008000500", @ANYRES32=r4], 0x5c}}, 0x0) 17:25:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 17:25:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2907.943344][T13230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2907.961697][T13230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 17:25:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000, {r0}}, 0x58) 17:25:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x24d185300, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xff03000000000000, {r0}}, 0x58) [ 2908.091686][T21731] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2908.130373][T21731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2908.139044][T21731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2908.259786][T21736] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2908.373755][T21734] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2908.384030][T21734] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2908.399778][T21734] 8021q: adding VLAN 0 to HW filter on device team0 [ 2908.421378][T21734] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2908.492329][T21736] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2908.508608][T21742] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2908.518453][T21742] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2908.548484][T21689] device veth0_vlan entered promiscuous mode [ 2908.561725][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2908.572206][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2908.586017][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2908.593996][T16602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2908.605580][T21689] device veth1_vlan entered promiscuous mode [ 2908.626201][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2908.638957][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready